Abstract
Information is increasingly in a digital-only format and almost everything we do nowadays depends on a digital identity for authentication and authorization. No matter how strong the authentication system is, after the authentication phase, there is no continuous verification that user is still the same human being that successfully logged in, thus leaving the system unprotected. This paper presents a usable breakthrough approach for continuous authentication with free typed text through the use of biometric techniques based on keystroke dynamics. Our main purpose is to achieve a reduction of the required sample size, while improving (or at least not worsen) precision performance, by adapting and improving parameters on a keystroke dynamics algorithm.
Chapter PDF
Similar content being viewed by others
Keywords
References
Lynch, D.M.: Securing Against Insider Attacks. Information Security Journal: A Global Perspective 15, 39–47 (2006)
Schulz, E.E.: A Framework for Understanding and Predicting Insider Attacks. Computers and Security 21, 526–531 (2002)
Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems 16, 351–359 (2000)
Killourhy, K., Maxion, R.: Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In: Dependable Systems and Networks, pp. 125–134 (2009)
CENELEC European standard EN 50133-1, Alarm systems. Access control systems for use in security applications, European Committee for Eletrotechnical Standardization (2002)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystrokes dynamics. ACM Transactions on Information and Systems Security 5, 367–397 (2002)
Magalhães, S.: Keystroke dynamics - stepping forward in authentication. GESTS International Transactions on Computer Science and Engineering 29 (2006)
Ferreira, J., Santos, H., Patrão, B.: Intrusion detection through keystroke dynamics. In: 10th European Conference on Information Warfare and Security (2011)
Al Solami, E.: Continuous Biometric Authentication: Can It Be More Practical? In: 12th IEEE International Conference on High Performance Computing and Communications, pp. 647–652 (2010)
Ferreira, J., Santos, H.: Keystroke dynamics for continuous access control enforcement. In: Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge, pp. 216–223 (2012)
Serway, R.A., Jewett, J.W.: Physics for Scientists and Engineers (2003)
Mitchell, M.: An Introduction to Genetic Algorithms (Complex Adaptive Systems) (1998)
Boruc, P.: Continuous keystroke dynamics: A different perspective towards biometric evaluation. Information Security Technical Report 17, 36–43 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pinto, P., Patrão, B., Santos, H. (2014). Free Typed Text Using Keystroke Dynamics for Continuous Authentication. In: De Decker, B., Zúquete, A. (eds) Communications and Multimedia Security. CMS 2014. Lecture Notes in Computer Science, vol 8735. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44885-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-662-44885-4_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44884-7
Online ISBN: 978-3-662-44885-4
eBook Packages: Computer ScienceComputer Science (R0)