Continual Retraining of Keystroke Dynamics Based Authenticator

  • Pilsung Kang
  • Seong-seob Hwang
  • Sungzoon Cho
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)


Keystroke dynamics based authentication (KDA) verifies a user based on the typing pattern. During enroll, a few typing patterns are provided, which are then used to train a classifier. The typing style of a user is not expected to change. However, sometimes it does change, resulting in a high false reject. In order to achieve a better authentication performance, we propose to continually retrain classifiers with recent login typing patterns by updating the training data set. There are two ways to update it. The moving window uses a fixed number of most recent patterns while the growing window uses all the new patterns as well as the original enroll patterns. We applied the proposed method to the real data set involving 21 users. The experimental results show that both the moving window and the growing window approach outperform the fixed window approach, which does not retrain a classifier.


  1. 1.
    Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Rand Report R-256-NSF. Rand Corporation (1980)Google Scholar
  2. 2.
    Umphress, D., Williams, G.: Identity Verification through Keyboard Characteristics. International Journal of Man-Machine Studies 23, 263–273 (1985)CrossRefGoogle Scholar
  3. 3.
    Obaidat, M., Sadoun, S.: Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics 27(2), 262–269 (1997)CrossRefGoogle Scholar
  4. 4.
    Cho, S., Han, C., Han, D., Kim, H.: Web-based keystroke dynamics identity verification using neural network. J. Organizational computing and electronics commerce 10(4), 295–307 (2000)CrossRefGoogle Scholar
  5. 5.
    Brown, M., Rogers, S.J.: User Identification via keystroke characteristics of typed names using neural networks. Int. J. Man-Machine Studies 39, 999–1014 (1993)CrossRefGoogle Scholar
  6. 6.
    Peacock, A., Ke, X., Wilkerson, M.: Typing Patterns: A Key to User Identification. IEEE Security & Privacy Magazine 5(2), 40–47 (2004)CrossRefGoogle Scholar
  7. 7.
    Hwang, S., Lee, H., Cho, S.: Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication. In: Chen, H., Wang, F.-Y., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds.) WISI 2006. LNCS, vol. 3917, pp. 73–78. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Pilsung Kang
    • 1
  • Seong-seob Hwang
    • 1
  • Sungzoon Cho
    • 1
  1. 1.Seoul National University, San 56-1, Shillim-dong, Kwanak-gu, 151-744, SeoulKorea

Personalised recommendations