Skip to main content
Log in

Machine Learning Methods in Authentication Problems Using Password Keystroke Dynamics

  • Informatics
  • Published:
Computational Mathematics and Modeling Aims and scope Submit manuscript

We examine the problem of user authentication from keystroke dynamics. A new static authentication method that collects information about user keystrokes is described. Its applicability to the authentication problem is substantiated by experiments and the optimal conditions for the implementation of the method are chosen.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM J. Computing, 17, No. 2, 281–308 (1988).

    Article  MATH  MathSciNet  Google Scholar 

  2. M. Krause and H. F. Tipton, Handbook of Information Security Management, Auerbach Publications— CRC Press.

  3. E. Lau, X. Liu, C. Xiao, and X. Yu, “Enhanced user authentication through keystroke biometrics,” Computer and Network Security, Final project report, MIT (2004).

  4. F. W. M. H.Wong, A. S. M. Supian, and A. F. Ismail, “Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm,” IEEE, 911–915 (2001).

  5. F. Bergadano, D. Gunetti, and C. Picardi, “User authentication through keystroke dynamics,” ACM Trans. Information and System Security, 5, No. 4, 367–397 (Nov. 2002).

    Article  Google Scholar 

  6. G. Saggio, G. Costantini, and M. Todisco, “Cumulative and ratio time evaluations in keystroke dynamics to improve the password security mechanism,” J. Comput. Inform. Technol., 1, No. 2, 4–11 (2011).

    Google Scholar 

  7. K. S. Sung and S. Cho, “GA SVM wrapper ensemble for keystroke dynamics authentication,” Proc. Int. Conf. Biometrics, ICB, Hong Kong (2004), pp. 654–660.

  8. V. Yu. Kaganov, A. V. Korolev, M. N. Krylov, I. V. Mashechkin, and M. I. Petrovskii, “Active authentication by analysis of keystroke dynamics,” Informatika i Ee Primeneniya, 7, No. 3 (2013).

  9. K. S. Killourhy and R. A. Maxion, Comparing Anomaly Detectors for Keystroke Dynamics, IEEE Computer Society Press, Los Alamitos CA (2009).

    Google Scholar 

  10. M. I. Petrovsky, “Outlier detection algorithms in data mining systems,” Programming and Computer Software, 29, No. 4, 228–237 (2003).

    Article  MathSciNet  Google Scholar 

  11. B. Scholkopf and A. Smola, Learning with Kernels (2002).

  12. L. A. Zadeh, “Fuzzy sets,” Information and Control, 8, No. 3, 338–353 (1965).

    Article  MATH  MathSciNet  Google Scholar 

  13. R. C. Team, A Language and Environment for Statistical Computing, Foundation for Statistical Computing (2005).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Yu. Kaganov.

Additional information

Translated from Prikladnaya Matematika i Informatika, No. 46, 2014, pp. 89–102.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaganov, V.Y., Korolev, A.K., Krylov, M.N. et al. Machine Learning Methods in Authentication Problems Using Password Keystroke Dynamics. Comput Math Model 26, 398–407 (2015). https://doi.org/10.1007/s10598-015-9280-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10598-015-9280-3

Keywords

Navigation