Abstract
This paper concerns database quality in the Keystroke Dynamics domain. The authors present their own algorithm and test it using two databases: the authors’ own KDS database and Keystroke Dynamics - Benchmark Data Set online database. Following problems are studied theoretically and experimentally: classification accuracy, database representativeness, increase in typing proficiency and finally: time precision in samples acquisition. Results show that the impact of the database uniqueness on the experimental results is substantial and should not be disregarded in classification algorithm evaluation.
Keywords
- keystroke dynamics
- identification
- authentication
- behavioral science
- biometrics
- computer security
Chapter PDF
References
Wood, H.M.: The use of passwords for controlling access to remote computer systems and services. In: Proc. of the National Computer Conf., New York, pp. 27–33 (1977)
Burnett, M., Kleiman, D.: Perfect Passwords. Syngress, Rockland (2005)
Schneier, B.: Secure Passwords Keep You Safer (January 11, 2007), http://www.wired.com/politics/security/commentary/securitymatters/2007/01/72458
Li, X., Maybank, S.J., Yan, S., Tao, D., Xu, D.: Gait Components and Their Application to Gender Recognition. IEEE Trans. Syst. Man Cybern. C, Appl. Rev. 38(2), 145–155 (2008)
Veeramachaneni, K., Osadciw, L.A., Varshney, P.K.: An adaptive multimodal biometric management algorithm. IEEE Trans. Syst. Man Cybern. C, Appl. Rev. 35(3), 344–356 (2005)
Killourhy, K., Maxion, R.A.: Keystroke Dynamics - Benchmark Data Set (June 29, 2009), http://www.cs.cmu.edu/~keystroke/
Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics Using Fixed Text. In: IEEE-ICBAKE 2009 International Conference on Biometrics and Kansei Engineering, Cieszyn, Poland, pp. 70–75 (2009)
Panasiuk, P., Saeed, K.: A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Choraś, R.S. (ed.) Image Processing and Communications Challenges 2. AISC, vol. 84, pp. 113–120. Springer, Heidelberg (2010)
Rybnik, M., Tabedzki, M., Saeed, K.: A keystroke dynamics based system for user identification. In: IEEE-CISIM 2008 – Computer Information Systems and Industrial Management Applications, Ostrava, Czech Republic, pp. 225–230 (2008)
Checco, J.C.: Keystroke Dynamics and Corporate Security. WSTA Ticker (2003)
CENELEC. European Standard EN 50133-1: Alarm systems. Access control systems for use in security applications. Part 1: System requirements, Standard Number EN 50133-1:1996/A1:2002, Technical Body CLC/TC 79, European Committee for Electrotechnical Standardization, CENELEC (2002)
Dietz, P.H., Eidelson, B., Westhues, J., Bathiche, S.: A practical pressure sensitive computer keyboard. In: Proc. of the 22nd Annual ACM Symposium on User Interface Software and Technology, New York (2009)
UIST. Student Innovation Contest Results (October 6, 2009), http://www.acm.org/uist/uist2009/program/sicwinners.html
Saevanee, H., Bhattarakosol, P.: Authenticating User Using Keystroke Dynamics and Finger Pressure. In: Consumer Communications and Networking Conference, Las Vegas, NV, pp. 1–2 (2009)
Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification Using the ARTMAP-FD Neural Network. In: Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 61–64 (2007)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6(1) (2006)
Campisi, P., Maiorana, E., Lo Bosco, M., Neri, A.: User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3(4) (2009)
Karatzouni, S., Clarke, N.L.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 253–263. Springer, Boston (2007)
Ogihara, A., Matsumura, H., Shiozaki, A.: Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication. In: International Symposium on Intelligent Signal Processing and Communications, Tottori, Japan, pp. 223–226 (2006)
Killourhy, K.S., Maxion, R.A.: Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In: Dependable Systems & Networks, Lisbon, Portugal, pp. 125–134 (2009)
Killourhy, K.S., Maxion, R.A.: The Effect of Clock Resolution on Keystroke Dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 331–350. Springer, Heidelberg (2008)
Panasiuk, P., Saeed, K.: Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. In: Chaki, N., Cortesi, A. (eds.) CISIM 2011. CCIS, vol. 245, pp. 105–112. Springer, Heidelberg (2011)
Panasiuk, P.: Keystroke Dynamics System (March 15, 2012), http://www.kds.miszu.pl
Psylock (February 08, 2011), http://www.psylock.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rybnik, M., Panasiuk, P., Saeed, K., Rogowski, M. (2012). Advances in the Keystroke Dynamics: The Practical Impact of Database Quality. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds) Computer Information Systems and Industrial Management. CISIM 2012. Lecture Notes in Computer Science, vol 7564. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33260-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-33260-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33259-3
Online ISBN: 978-3-642-33260-9
eBook Packages: Computer ScienceComputer Science (R0)