Abstract
Passwords are an antique authentication methodology. With the recent hacks and leaks, keeping credentials secure is proving to be more difficult day by day. An answer to the present drawback is to feature different factors to authentication. The foremost non-invasive of that is writing patterns. This is often referred to as Keystroke Dynamics. It is the careful temporal order information that describes precisely once every key was pressed and once it absolutely was discharged as someone is typing using a keyboard. Keystroke Dynamics uses the behavioral aspect of the way and rhythm during which different types of characters are pressed on a keyboard. The rhythms of the keystrokes of a user are measured, and a novel biometric template is developed of the user’s writing pattern for any future purpose of authentication. This paper aims to make a customizable and protractile keystroke dynamics authentication system and a dashboard that is standard and simple to use in conjunction with existing authentication systems. The investigations reveal that using typing pattern for 2 factor authentication has clocked a 50% faster rate of signing in than conventional results. The average response time of an authentication request on our system is ~100–120 ms which is a very good time for any two factor authentication system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Acien A et al (2020) Typenet: scaling up keystroke biometrics. In: 2020 IEEE international joint conference on biometrics (IJCB). IEEE
Mhenni A et al (2019) Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. Comput Secur 83:151–166. https://doi.org/10.1016/j.cose.2019.02.002
Foresi A, Samavi R (2019) User authentication using keystroke dynamics via crowdsourcing. In: 2019 17th international conference on privacy, security and trust (PST), Fredericton, NB, Canada
Rahman KA, Neupane D, Zaiter A, Hossain MS (2019) Web user authentication using chosen word keystroke dynamics. In: 2019 18th IEEE international conference on machine learning and applications (ICMLA), Boca Raton, FL, USA
Bharti M (2014) Effect of signal direct detection on sub-carrier multiplexed radio over fiber system. Int J Adv Res Comput Commun Eng
Krishnamoorthy S et al (2018) Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning. In: Proceedings of the 2018 2nd international conference on biometric engineering and applications
Lin C-H, Liu J-C, Lee K-Y (2018) On neural networks for biometric authentication based on keystroke dynamics. Sensors Mater 30(3):385–396
Zhang J et al (2018) T2FA: transparent two-factor authentication. IEEE Access 6:32677–32686
Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradig (JSCP) 1(02):80–90
Alsultan A, Warwick K, Wei H (2017) Non-conventional keystroke dynamics for user authentication. Pattern Recogn Lett 89:53–59
Huang J, Hou D, Schuckers S (2017) A practical evaluation of free-text keystroke dynamics. In: 2017 IEEE international conference on identity, security and behavior analysis (ISBA). IEEE
Kochegurova EA, Gorokhova ES, Mozgaleva AI (2017) Development of the keystroke dynamics recognition system. J Phys: Conf Ser 803(1). IOP Publishing
Kambourakis G et al (2016) Introducing touchstroke: keystroke‐based authentication system for smartphones. Secur Commun Netw 9(6):542–554
Shen S-S et al (2016) Enhanced keystroke dynamics authentication utilizing pressure detection. In: 2016 international conference on applied system innovation (ICASI). IEEE
Bharti M Sub-carriers multiplexing at various data rates on radio over fiber systems. Int J Adv Res Electron Commun Eng (IJARECE)
Ho J, Kang D-K (2014) Sequence alignment of dynamic intervals for keystroke dynamics based user authentication. In: 2014 Joint 7th international conference on soft computing and intelligent systems (SCIS) and 15th international symposium on advanced intelligent systems (ISIS). IEEE
Teh PS, Teoh A, Yue S (2013) A survey of keystroke dynamics biometrics. Sci World J 2013:408280. https://doi.org/10.1155/2013/408280
Satheesh M, Deepika M (2020) Implementation of multifactor authentication using optimistic fair exchange. J Ubiquit Comput Commun Technol (UCCT) 2(02):70–78
Dholi PR, Chaudhari KP (2012) Typing pattern recognition using keystroke dynamics. In: International conference on advances in information technology and mobile communication. Springer, Berlin, Heidelberg
Bours P (2012) Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf Secur Tech Rep 17(1–2):36–43
Manoharan JS (2021) A novel user layer cloud security model based on chaotic arnold transformation using fingerprint biometric traits. J Innov Image Process (JIIP) 3(01):36–51
Chang T-Y, Tsai C-J, Lin J-H (2012) A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J Syst Softw 85(5):1157–1165
Karnan M, Akila M, Krishnaraj N (2011) Biometric personal authentication using keystroke dynamics: a review. Appl Soft Comput 11(2):1565–1573
Ankesh K, Singh S, Niraj S (2010) User authentication by secured graphical password implementation. Int J Comput Appl 1. https://doi.org/10.5120/449-751
Bharti (2015) Design and analysis of OCDMA system using W/T codes at different bit rates. In: 2015 International conference on communication, information & computing technology (ICCICT)
Stefan D, Yao D (2010) Keystroke-dynamics authentication against synthetic forgeries. In: 6th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom 2010). IEEE
Giot R, El-Abed M, Rosenberger C (2009) Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: 2009 IEEE 3rd international conference on biometrics: theory, applications, and systems. IEEE
Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP international conference on dependable systems & networks. IEEE
Riesen K, Bunke H (2008) IAM graph database repository for graph based pattern recognition and machine learning. In: Joint IAPR international workshops on statistical techniques in pattern recognition (SPR) and structural and syntactic pattern recognition (SSPR). Springer, Berlin, Heidelberg
Killourhy K, Maxion R (2008) The effect of clock resolution on keystroke dynamics. In: International workshop on recent advances in intrusion detection. Springer, Berlin, Heidelberg
Bharti M Effect of signal direct detection on sub-carrier multiplexed radio over fiber system. Int J Adv Res Comput Commun Eng
Jiang, C-H, Shieh S, Liu J-C (2007) Keystroke statistical learning model for web authentication. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security
Wang Y, Du G-Y, Sun F-X (2006) A model for user authentication based on manner of keystroke and principal component analysis. In: 2006 international conference on machine learning and cybernetics. IEEE
Raj JS (2021) Secure data sharing platform for portable social networks with power saving operation. J IoT Soc Mob Anal Cloud 3(3):250–262
Zhao Y (2006) Learning user keystroke patterns for authentication. In: Proceedings of world academy of science, engineering and technology, vol 14
Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur (TISSEC) 5(4):367–397
Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Futur Gener Comput Syst 16(4):351–359
Bleha S, Slivinsky C, Hussien B (1990) Computer-access security systems using keystroke dynamics. IEEE Trans Pattern Anal Mach Intell 12(12):1217–1222
Reese K, Smith T, Dutson J, Armknecht J, Cameron J, Seamons K (2019) A usability study of five two-factor authentication methods
Arif H, Shukur MZ, Kamrul Hasan M (2021) Enhancing multi-factor user authentication for electronic payments. In: Inventive computation and information technologies. Springer, Singapore, pp 869–882
Bharti M (2014) Simulative analysis of 2-code keying approach using Walsh Hadamard codes to enhance security and reduce dispersion in OCDMA system. In: 2014 International conference on data mining and intelligent computing (IC)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Anand, S., Bharti, M. (2022). Authentication Using Typing Pattern. In: Asokan, R., Ruiz, D.P., Baig, Z.A., Piramuthu, S. (eds) Smart Data Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-3311-0_18
Download citation
DOI: https://doi.org/10.1007/978-981-19-3311-0_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3310-3
Online ISBN: 978-981-19-3311-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)