We examine the problem of user authentication from keystroke dynamics. A new static authentication method that collects information about user keystrokes is described. Its applicability to the authentication problem is substantiated by experiments and the optimal conditions for the implementation of the method are chosen.
Similar content being viewed by others
References
S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks,” SIAM J. Computing, 17, No. 2, 281–308 (1988).
M. Krause and H. F. Tipton, Handbook of Information Security Management, Auerbach Publications— CRC Press.
E. Lau, X. Liu, C. Xiao, and X. Yu, “Enhanced user authentication through keystroke biometrics,” Computer and Network Security, Final project report, MIT (2004).
F. W. M. H.Wong, A. S. M. Supian, and A. F. Ismail, “Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm,” IEEE, 911–915 (2001).
F. Bergadano, D. Gunetti, and C. Picardi, “User authentication through keystroke dynamics,” ACM Trans. Information and System Security, 5, No. 4, 367–397 (Nov. 2002).
G. Saggio, G. Costantini, and M. Todisco, “Cumulative and ratio time evaluations in keystroke dynamics to improve the password security mechanism,” J. Comput. Inform. Technol., 1, No. 2, 4–11 (2011).
K. S. Sung and S. Cho, “GA SVM wrapper ensemble for keystroke dynamics authentication,” Proc. Int. Conf. Biometrics, ICB, Hong Kong (2004), pp. 654–660.
V. Yu. Kaganov, A. V. Korolev, M. N. Krylov, I. V. Mashechkin, and M. I. Petrovskii, “Active authentication by analysis of keystroke dynamics,” Informatika i Ee Primeneniya, 7, No. 3 (2013).
K. S. Killourhy and R. A. Maxion, Comparing Anomaly Detectors for Keystroke Dynamics, IEEE Computer Society Press, Los Alamitos CA (2009).
M. I. Petrovsky, “Outlier detection algorithms in data mining systems,” Programming and Computer Software, 29, No. 4, 228–237 (2003).
B. Scholkopf and A. Smola, Learning with Kernels (2002).
L. A. Zadeh, “Fuzzy sets,” Information and Control, 8, No. 3, 338–353 (1965).
R. C. Team, A Language and Environment for Statistical Computing, Foundation for Statistical Computing (2005).
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated from Prikladnaya Matematika i Informatika, No. 46, 2014, pp. 89–102.
Rights and permissions
About this article
Cite this article
Kaganov, V.Y., Korolev, A.K., Krylov, M.N. et al. Machine Learning Methods in Authentication Problems Using Password Keystroke Dynamics. Comput Math Model 26, 398–407 (2015). https://doi.org/10.1007/s10598-015-9280-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10598-015-9280-3