Skip to main content

Authentication Using Typing Pattern

  • Conference paper
  • First Online:
Smart Data Intelligence

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 449 Accesses

Abstract

Passwords are an antique authentication methodology. With the recent hacks and leaks, keeping credentials secure is proving to be more difficult day by day. An answer to the present drawback is to feature different factors to authentication. The foremost non-invasive of that is writing patterns. This is often referred to as Keystroke Dynamics. It is the careful temporal order information that describes precisely once every key was pressed and once it absolutely was discharged as someone is typing using a keyboard. Keystroke Dynamics uses the behavioral aspect of the way and rhythm during which different types of characters are pressed on a keyboard. The rhythms of the keystrokes of a user are measured, and a novel biometric template is developed of the user’s writing pattern for any future purpose of authentication. This paper aims to make a customizable and protractile keystroke dynamics authentication system and a dashboard that is standard and simple to use in conjunction with existing authentication systems. The investigations reveal that using typing pattern for 2 factor authentication has clocked a 50% faster rate of signing in than conventional results. The average response time of an authentication request on our system is ~100–120 ms which is a very good time for any two factor authentication system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Acien A et al (2020) Typenet: scaling up keystroke biometrics. In: 2020 IEEE international joint conference on biometrics (IJCB). IEEE

    Google Scholar 

  2. Mhenni A et al (2019) Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. Comput Secur 83:151–166. https://doi.org/10.1016/j.cose.2019.02.002

  3. Foresi A, Samavi R (2019) User authentication using keystroke dynamics via crowdsourcing. In: 2019 17th international conference on privacy, security and trust (PST), Fredericton, NB, Canada

    Google Scholar 

  4. Rahman KA, Neupane D, Zaiter A, Hossain MS (2019) Web user authentication using chosen word keystroke dynamics. In: 2019 18th IEEE international conference on machine learning and applications (ICMLA), Boca Raton, FL, USA

    Google Scholar 

  5. Bharti M (2014) Effect of signal direct detection on sub-carrier multiplexed radio over fiber system. Int J Adv Res Comput Commun Eng

    Google Scholar 

  6. Krishnamoorthy S et al (2018) Identification of user behavioral biometrics for authentication using keystroke dynamics and machine learning. In: Proceedings of the 2018 2nd international conference on biometric engineering and applications

    Google Scholar 

  7. Lin C-H, Liu J-C, Lee K-Y (2018) On neural networks for biometric authentication based on keystroke dynamics. Sensors Mater 30(3):385–396

    Google Scholar 

  8. Zhang J et al (2018) T2FA: transparent two-factor authentication. IEEE Access 6:32677–32686

    Google Scholar 

  9. Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradig (JSCP) 1(02):80–90

    Google Scholar 

  10. Alsultan A, Warwick K, Wei H (2017) Non-conventional keystroke dynamics for user authentication. Pattern Recogn Lett 89:53–59

    Article  Google Scholar 

  11. Huang J, Hou D, Schuckers S (2017) A practical evaluation of free-text keystroke dynamics. In: 2017 IEEE international conference on identity, security and behavior analysis (ISBA). IEEE

    Google Scholar 

  12. Kochegurova EA, Gorokhova ES, Mozgaleva AI (2017) Development of the keystroke dynamics recognition system. J Phys: Conf Ser 803(1). IOP Publishing

    Google Scholar 

  13. Kambourakis G et al (2016) Introducing touchstroke: keystroke‐based authentication system for smartphones. Secur Commun Netw 9(6):542–554

    Google Scholar 

  14. Shen S-S et al (2016) Enhanced keystroke dynamics authentication utilizing pressure detection. In: 2016 international conference on applied system innovation (ICASI). IEEE

    Google Scholar 

  15. Bharti M Sub-carriers multiplexing at various data rates on radio over fiber systems. Int J Adv Res Electron Commun Eng (IJARECE)

    Google Scholar 

  16. Ho J, Kang D-K (2014) Sequence alignment of dynamic intervals for keystroke dynamics based user authentication. In: 2014 Joint 7th international conference on soft computing and intelligent systems (SCIS) and 15th international symposium on advanced intelligent systems (ISIS). IEEE

    Google Scholar 

  17. Teh PS, Teoh A, Yue S (2013) A survey of keystroke dynamics biometrics. Sci World J 2013:408280. https://doi.org/10.1155/2013/408280

    Article  Google Scholar 

  18. Satheesh M, Deepika M (2020) Implementation of multifactor authentication using optimistic fair exchange. J Ubiquit Comput Commun Technol (UCCT) 2(02):70–78

    Google Scholar 

  19. Dholi PR, Chaudhari KP (2012) Typing pattern recognition using keystroke dynamics. In: International conference on advances in information technology and mobile communication. Springer, Berlin, Heidelberg

    Google Scholar 

  20. Bours P (2012) Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf Secur Tech Rep 17(1–2):36–43

    Article  Google Scholar 

  21. Manoharan JS (2021) A novel user layer cloud security model based on chaotic arnold transformation using fingerprint biometric traits. J Innov Image Process (JIIP) 3(01):36–51

    Google Scholar 

  22. Chang T-Y, Tsai C-J, Lin J-H (2012) A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J Syst Softw 85(5):1157–1165

    Article  Google Scholar 

  23. Karnan M, Akila M, Krishnaraj N (2011) Biometric personal authentication using keystroke dynamics: a review. Appl Soft Comput 11(2):1565–1573

    Article  Google Scholar 

  24. Ankesh K, Singh S, Niraj S (2010) User authentication by secured graphical password implementation. Int J Comput Appl 1. https://doi.org/10.5120/449-751

  25. Bharti (2015) Design and analysis of OCDMA system using W/T codes at different bit rates. In: 2015 International conference on communication, information & computing technology (ICCICT)

    Google Scholar 

  26. Stefan D, Yao D (2010) Keystroke-dynamics authentication against synthetic forgeries. In: 6th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom 2010). IEEE

    Google Scholar 

  27. Giot R, El-Abed M, Rosenberger C (2009) Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: 2009 IEEE 3rd international conference on biometrics: theory, applications, and systems. IEEE

    Google Scholar 

  28. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP international conference on dependable systems & networks. IEEE

    Google Scholar 

  29. Riesen K, Bunke H (2008) IAM graph database repository for graph based pattern recognition and machine learning. In: Joint IAPR international workshops on statistical techniques in pattern recognition (SPR) and structural and syntactic pattern recognition (SSPR). Springer, Berlin, Heidelberg

    Google Scholar 

  30. Killourhy K, Maxion R (2008) The effect of clock resolution on keystroke dynamics. In: International workshop on recent advances in intrusion detection. Springer, Berlin, Heidelberg

    Google Scholar 

  31. Bharti M Effect of signal direct detection on sub-carrier multiplexed radio over fiber system. Int J Adv Res Comput Commun Eng

    Google Scholar 

  32. Jiang, C-H, Shieh S, Liu J-C (2007) Keystroke statistical learning model for web authentication. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security

    Google Scholar 

  33. Wang Y, Du G-Y, Sun F-X (2006) A model for user authentication based on manner of keystroke and principal component analysis. In: 2006 international conference on machine learning and cybernetics. IEEE

    Google Scholar 

  34. Raj JS (2021) Secure data sharing platform for portable social networks with power saving operation. J IoT Soc Mob Anal Cloud 3(3):250–262

    Google Scholar 

  35. Zhao Y (2006) Learning user keystroke patterns for authentication. In: Proceedings of world academy of science, engineering and technology, vol 14

    Google Scholar 

  36. Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur (TISSEC) 5(4):367–397

    Article  Google Scholar 

  37. Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Futur Gener Comput Syst 16(4):351–359

    Article  Google Scholar 

  38. Bleha S, Slivinsky C, Hussien B (1990) Computer-access security systems using keystroke dynamics. IEEE Trans Pattern Anal Mach Intell 12(12):1217–1222

    Article  Google Scholar 

  39. Reese K, Smith T, Dutson J, Armknecht J, Cameron J, Seamons K (2019) A usability study of five two-factor authentication methods

    Google Scholar 

  40. Arif H, Shukur MZ, Kamrul Hasan M (2021) Enhancing multi-factor user authentication for electronic payments. In: Inventive computation and information technologies. Springer, Singapore, pp 869–882

    Google Scholar 

  41. Bharti M (2014) Simulative analysis of 2-code keying approach using Walsh Hadamard codes to enhance security and reduce dispersion in OCDMA system. In: 2014 International conference on data mining and intelligent computing (IC)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaurya Anand .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anand, S., Bharti, M. (2022). Authentication Using Typing Pattern. In: Asokan, R., Ruiz, D.P., Baig, Z.A., Piramuthu, S. (eds) Smart Data Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-3311-0_18

Download citation

Publish with us

Policies and ethics