Skip to main content
Top

2017 | OriginalPaper | Chapter

A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment

Authors : Sung-Hoon Lee, Jong-Hyuk Roh, Soohyung Kim, Seung-Hun Jin

Published in: Information Security Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

User behavior-based authentication, while providing convenience to the user, is not widely used in the real world due to its low accuracy. Keystroke dynamics is one of the user behavior-based authentication methods, and it has been studied for about 40 years. Conventional keystroke dynamics has used key timing features for the personal computer (PC) environment. Since the smartphone equipped with advanced sensors (e.g., accelerometer, gyroscope, and touchscreen sensor) was released, sensor-based features have been used to improve the accuracy of classifying users with key timing features. In this paper, we analyze the keystroke dynamics features in the literature and evaluate each feature to find efficient features. Based on tapping data collected from 12 participants, we evaluate the effectiveness of several features from the empirical data of a six-digit PIN. Our experimental results show that the feature Up-Up (UU), the time difference between releasing a key and the next key, and the min, max, and mean features extracted from motion sensor data have the best accuracy and efficiently classify each user.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: Some preliminary results. Report R-2526-NSF, Rand Corp (1980) Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: Some preliminary results. Report R-2526-NSF, Rand Corp (1980)
2.
go back to reference Buchoux, A., Clarke, N.L.: Deployment of keystroke analysis on a smartphone. In: Proceedings of the 6th Australian Information Security Management Conference, Perth, Western Australia, pp. 40–47. SECAU - Security Research Centre (2008) Buchoux, A., Clarke, N.L.: Deployment of keystroke analysis on a smartphone. In: Proceedings of the 6th Australian Information Security Management Conference, Perth, Western Australia, pp. 40–47. SECAU - Security Research Centre (2008)
3.
go back to reference Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based authentication system for smartphones. Security and Communication Networks (2014) Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke‐based authentication system for smartphones. Security and Communication Networks (2014)
4.
go back to reference Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proceedings of the International Conference on Computer and Electrical Engineering, pp. 82–86 (2008) Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: Proceedings of the International Conference on Computer and Electrical Engineering, pp. 82–86 (2008)
5.
go back to reference Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: William, M. (ed.) Department of Computer Science, pp. 1–13. WM-CS (2012) Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: William, M. (ed.) Department of Computer Science, pp. 1–13. WM-CS (2012)
6.
go back to reference Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 92–111. Springer, Cham (2014). doi:10.1007/978-3-319-08509-8_6 Giuffrida, C., Majdanik, K., Conti, M., Bos, H.: I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 92–111. Springer, Cham (2014). doi:10.​1007/​978-3-319-08509-8_​6
7.
go back to reference Ho, G.: Tapdynamics: Strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University (2014) Ho, G.: Tapdynamics: Strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University (2014)
8.
go back to reference Pisani, P.H., Lorena, A.C.: Emphasizing typing signature in keystroke dynamics using immune algorithms. Appl. Soft Comput. 34, 178–193 (2015)CrossRef Pisani, P.H., Lorena, A.C.: Emphasizing typing signature in keystroke dynamics using immune algorithms. Appl. Soft Comput. 34, 178–193 (2015)CrossRef
9.
go back to reference Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafić, T., Camtepe, A., Lohlein, B., Heister, U., Moller, S., Rokach, L., Elovici, Y.: Identity theft, computers and behavioral biometrics. In: ISI 2009, Richardson, TX, USA, 8–11 June 2009 Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafić, T., Camtepe, A., Lohlein, B., Heister, U., Moller, S., Rokach, L., Elovici, Y.: Identity theft, computers and behavioral biometrics. In: ISI 2009, Richardson, TX, USA, 8–11 June 2009
11.
go back to reference Trojahn, M., Ortmeier, F.: KeyGait: framework for continuously biometric authentication during usage of a smartphone. In: 3rd International Conference on Mobile Services, Resources, and Users, pp. 114–119 (2013) Trojahn, M., Ortmeier, F.: KeyGait: framework for continuously biometric authentication during usage of a smartphone. In: 3rd International Conference on Mobile Services, Resources, and Users, pp. 114–119 (2013)
12.
go back to reference Ting-Yi, C., Cheng-Jung, T., Jyun-Hao, L.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157–1165 (2012)CrossRef Ting-Yi, C., Cheng-Jung, T., Jyun-Hao, L.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157–1165 (2012)CrossRef
13.
go back to reference Jain, L., Monaco, J.V., Coakley, M.J., Tappert, C.C.: Passcode keystroke biometric performance on smartphone touchscreens is superior to that on hardware keyboards. Int. J. Res. Comput. Appl. Inf. Technol. 2, 29–33 (2014) Jain, L., Monaco, J.V., Coakley, M.J., Tappert, C.C.: Passcode keystroke biometric performance on smartphone touchscreens is superior to that on hardware keyboards. Int. J. Res. Comput. Appl. Inf. Technol. 2, 29–33 (2014)
14.
go back to reference Draffin, B., Zhu, J., Zhang, J.: KeySens: passive user authentication through micro-behavior modeling of soft keyboard interaction. In: Memmi, G., Blanke, U. (eds.) MobiCASE 2013. LNICST, vol. 130, pp. 184–201. Springer, Cham (2014). doi:10.1007/978-3-319-05452-0_14 CrossRef Draffin, B., Zhu, J., Zhang, J.: KeySens: passive user authentication through micro-behavior modeling of soft keyboard interaction. In: Memmi, G., Blanke, U. (eds.) MobiCASE 2013. LNICST, vol. 130, pp. 184–201. Springer, Cham (2014). doi:10.​1007/​978-3-319-05452-0_​14 CrossRef
15.
go back to reference de Mendizabal-Vazquez, I., de Santos-Sierra, D., Guerra-Casanova, J., Sanchez-Avila, C.: Supervised classification methods applied to keystroke dynamics through mobile devices. In: IEEE International Carnahan Conference on Security Technology, pp. 1–6 (2014) de Mendizabal-Vazquez, I., de Santos-Sierra, D., Guerra-Casanova, J., Sanchez-Avila, C.: Supervised classification methods applied to keystroke dynamics through mobile devices. In: IEEE International Carnahan Conference on Security Technology, pp. 1–6 (2014)
16.
go back to reference Hall, M., Frank, E., Homes, G., Pfahringer, B., Reutemann, P., Wittern, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10–18 (2016) Hall, M., Frank, E., Homes, G., Pfahringer, B., Reutemann, P., Wittern, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10–18 (2016)
17.
go back to reference Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009) Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)
Metadata
Title
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment
Authors
Sung-Hoon Lee
Jong-Hyuk Roh
Soohyung Kim
Seung-Hun Jin
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-56549-1_31

Premium Partner