Analysis and Evaluation of Keystroke Duration of User’s Typing as a Distinctive Measure of Recognition

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 221)

Abstract

This paper illustrated one unique measure of keystroke patterns of user typing to prevent insider threats with combination of existing keystroke credentials. While insider threats may never be eliminated, it is worth noting that risk-mitigating counter measures exist. Every organization’s security architecture must take insider threat into account. As reiterated trough out the security industry, defense in depth is the essential. Defense in depth requires security professional to take a layered approach to protecting information. In essence, we should never rely on just one security method or technology. Only user ID and passwords are not enough strong now a day to protect workstations from unauthorized access. Being remarkable advantages and to support multilevel authentication biometrics may be strong add-on. Recent research on behavioral biometrics i.e., keystroke dynamics proves its efficiency for stronger authentication. With numerous advantages keystroke pattern credential are employing in many organization to establish layered security mechanism. Work of last decade on keystroke dynamics also reveals some drawbacks. So research is going on to find more traits of user typing for more efficient authentication. Through this paper we proposed and experimentally proved one measure of keystroke pattern which is distinctive for each user and can make keystroke pattern credential stronger.

Keywords

Identification Biometrics Keystroke dynamics Degree of disorder Digraph Internal security 

References

  1. 1.
    Klein D (1990) Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX security workshop, Aug 1990Google Scholar
  2. 2.
    Ahmed AAE, Traore I (2005) Anomaly intrusion detection based on biometrics," Information assurance workshop, IAW ‘05. Proceedings from the sixth annual IEEE SMC, pp 452–453, 15–17 June 2005Google Scholar
  3. 3.
    Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol, Spec Issue on Image Video-Based Biometrics 14(1)Google Scholar
  4. 4.
    Monrose F, Rubin A (1997) Authentication via keystroke dynamics. 4th ACM conference on computer and communications security, pp 48–56Google Scholar
  5. 5.
    Postley HJ, Bender SS (2007) Key sequence rhythm recognition system and method. US patent 7,206,938Google Scholar
  6. 6.
    Revett K (2009) A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control Autom Syst 7(1):7–15CrossRefGoogle Scholar
  7. 7.
    Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397CrossRefGoogle Scholar
  8. 8.
    Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics ACM ACM Trans Inf Syst Secur 5(4):367–397Google Scholar
  9. 9.
    Umphress D, Williams G (1985) Identity verification through key-board characteristics. Int J Man Mach Stud 23(3):263–274CrossRefGoogle Scholar
  10. 10.
    Joyce R, Gupta G (1990) Identity authorization based on keystroke latencies. Commun ACM 33(2):168–176CrossRefGoogle Scholar
  11. 11.
    Brown M, Rogers SJ (1994) A practical approach to user authentication. Computer security applications conference, 1994. Proceedings of 10th annual, pp 108–116, 5-9 Dec 1994Google Scholar
  12. 12.
    Obaidat MS, Sadoun B (1997) Verification of Computer Users Using Keystroke Dynamics. IEEE Trans Syst Man Cybern-Part B 24(2):261–269Google Scholar
  13. 13.
    Martı J et al (2007) Recognizing individual typing patterns IbPRIA 2007, Part II, LNCS 4478, 323–330 Google Scholar
  14. 14.
    Rudrapal D et al (2012) A study and analysis of keystroke dynamics and its enhancement for proficient user authentication ICECT-2012, Apr 6–8thGoogle Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of TechnologyTripura (w)India

Personalised recommendations