Abstract
This paper concerns database quality in the Keystroke Dynamics domain. The authors present their own algorithm and test it using two databases: the authors’ own KDS database and Keystroke Dynamics - Benchmark Data Set online database. Following problems are studied theoretically and experimentally: classification accuracy, database representativeness, increase in typing proficiency and finally: time precision in samples acquisition. Results show that the impact of the database uniqueness on the experimental results is substantial and should not be disregarded in classification algorithm evaluation.
Chapter PDF
Similar content being viewed by others
References
Wood, H.M.: The use of passwords for controlling access to remote computer systems and services. In: Proc. of the National Computer Conf., New York, pp. 27–33 (1977)
Burnett, M., Kleiman, D.: Perfect Passwords. Syngress, Rockland (2005)
Schneier, B.: Secure Passwords Keep You Safer (January 11, 2007), http://www.wired.com/politics/security/commentary/securitymatters/2007/01/72458
Li, X., Maybank, S.J., Yan, S., Tao, D., Xu, D.: Gait Components and Their Application to Gender Recognition. IEEE Trans. Syst. Man Cybern. C, Appl. Rev. 38(2), 145–155 (2008)
Veeramachaneni, K., Osadciw, L.A., Varshney, P.K.: An adaptive multimodal biometric management algorithm. IEEE Trans. Syst. Man Cybern. C, Appl. Rev. 35(3), 344–356 (2005)
Killourhy, K., Maxion, R.A.: Keystroke Dynamics - Benchmark Data Set (June 29, 2009), http://www.cs.cmu.edu/~keystroke/
Rybnik, M., Panasiuk, P., Saeed, K.: User Authentication with Keystroke Dynamics Using Fixed Text. In: IEEE-ICBAKE 2009 International Conference on Biometrics and Kansei Engineering, Cieszyn, Poland, pp. 70–75 (2009)
Panasiuk, P., Saeed, K.: A Modified Algorithm for User Identification by His Typing on the Keyboard. In: Choraś, R.S. (ed.) Image Processing and Communications Challenges 2. AISC, vol. 84, pp. 113–120. Springer, Heidelberg (2010)
Rybnik, M., Tabedzki, M., Saeed, K.: A keystroke dynamics based system for user identification. In: IEEE-CISIM 2008 – Computer Information Systems and Industrial Management Applications, Ostrava, Czech Republic, pp. 225–230 (2008)
Checco, J.C.: Keystroke Dynamics and Corporate Security. WSTA Ticker (2003)
CENELEC. European Standard EN 50133-1: Alarm systems. Access control systems for use in security applications. Part 1: System requirements, Standard Number EN 50133-1:1996/A1:2002, Technical Body CLC/TC 79, European Committee for Electrotechnical Standardization, CENELEC (2002)
Dietz, P.H., Eidelson, B., Westhues, J., Bathiche, S.: A practical pressure sensitive computer keyboard. In: Proc. of the 22nd Annual ACM Symposium on User Interface Software and Technology, New York (2009)
UIST. Student Innovation Contest Results (October 6, 2009), http://www.acm.org/uist/uist2009/program/sicwinners.html
Saevanee, H., Bhattarakosol, P.: Authenticating User Using Keystroke Dynamics and Finger Pressure. In: Consumer Communications and Networking Conference, Las Vegas, NV, pp. 1–2 (2009)
Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke Patterns Classification Using the ARTMAP-FD Neural Network. In: Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, pp. 61–64 (2007)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6(1) (2006)
Campisi, P., Maiorana, E., Lo Bosco, M., Neri, A.: User authentication using keystroke dynamics for cellular phones. IET Signal Processing 3(4) (2009)
Karatzouni, S., Clarke, N.L.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Elofif, M., Labuschagne, L., Elofif, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 253–263. Springer, Boston (2007)
Ogihara, A., Matsumura, H., Shiozaki, A.: Biometric Verification Using Keystroke Motion and Key Press Timing for ATM User Authentication. In: International Symposium on Intelligent Signal Processing and Communications, Tottori, Japan, pp. 223–226 (2006)
Killourhy, K.S., Maxion, R.A.: Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In: Dependable Systems & Networks, Lisbon, Portugal, pp. 125–134 (2009)
Killourhy, K.S., Maxion, R.A.: The Effect of Clock Resolution on Keystroke Dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 331–350. Springer, Heidelberg (2008)
Panasiuk, P., Saeed, K.: Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. In: Chaki, N., Cortesi, A. (eds.) CISIM 2011. CCIS, vol. 245, pp. 105–112. Springer, Heidelberg (2011)
Panasiuk, P.: Keystroke Dynamics System (March 15, 2012), http://www.kds.miszu.pl
Psylock (February 08, 2011), http://www.psylock.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rybnik, M., Panasiuk, P., Saeed, K., Rogowski, M. (2012). Advances in the Keystroke Dynamics: The Practical Impact of Database Quality. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchoń, S. (eds) Computer Information Systems and Industrial Management. CISIM 2012. Lecture Notes in Computer Science, vol 7564. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33260-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-33260-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33259-3
Online ISBN: 978-3-642-33260-9
eBook Packages: Computer ScienceComputer Science (R0)