Skip to main content

A Machine Learning-Based Approach to Password Authentication Using Keystroke Biometrics

  • Conference paper
  • First Online:
Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 749))

Abstract

Keystroke authentication systems, though they are getting more popular, are a rather common method of data/network access. The typing dynamics apply to the automatic process of recognizing or verifying an individual’s identity depending on the form and style of tapping on a keyboard. It allows to authenticate individuals through their way of typing their password or a free text on a keyboard. In this paper, we perform analysis of machine learning algorithms on a keystroke dynamics-based data set with features like Hold time, Keyup-Keydown time and Keydown-Keydown time. This research is based on our methodology of using support vector machines (polynomial & radial basis kernels), random forest algorithm and artificial neural networks to recognize users based on their keystroke patterns. The review analysis shows a great result in user identification based on keystroke patterns with artificial neural networks showing better results among the three algorithms implemented at 91.8% accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Uludag U et al (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960

    Article  Google Scholar 

  2. Jain AK et al (2005) Biometric template security: challenges and solutions. In: Signal processing conference, pp 1–4

    Google Scholar 

  3. Moody J (2004) Public perceptions of biometric devices: the effect of misinformation on acceptance and use. In: Issues Inform Sci Inf Technol

    Google Scholar 

  4. Umphress D, Williams G (1985) Identity verification through keyboard characteristics. Int J Man-Mach Stud 23:263–273

    Article  Google Scholar 

  5. Obaidat MS et al (1999) Estimation of pitch period of speech signal using a new dyadic wavelet algorithm. Inf Sci 119:21–39

    Article  Google Scholar 

  6. Gunetti D et al (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur (TISSEC) 8:312–347

    Article  Google Scholar 

  7. Mondal S, Bours P (2015) A computational approach to the continuous authentication biometric system. Inf Sci 304:28–53

    Article  Google Scholar 

  8. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP international conference on dependable systems & networks, Lisbon, 2009, pp 125–134. https://doi.org/10.1109/DSN.2009.5270346

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thakare, A., Gondane, S., Prasad, N., Chigale, S. (2021). A Machine Learning-Based Approach to Password Authentication Using Keystroke Biometrics. In: Gopi, E.S. (eds) Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication. Lecture Notes in Electrical Engineering, vol 749. Springer, Singapore. https://doi.org/10.1007/978-981-16-0289-4_30

Download citation

Publish with us

Policies and ethics