Skip to main content
Top

2016 | OriginalPaper | Chapter

Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics

Authors : Adrianna Kozierkiewicz-Hetmanska, Aleksander Marciniak, Marcin Pietranik

Published in: Computational Collective Intelligence

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the rapid development of Internet and web-based application the number of system which an ordinary user needs to interact grows almost proportionally. People are expected to make bank transfers, send emails using multiple mailboxes, send tax declarations, send birthday wishes solely online. What is more, sometimes only this way being available. The sensitivity of information created using online tools is unquestionable and the highest possible level of data security is therefore expected not only on a corporate level, but also it should be guaranteed to ordinary users. That is the reason why a convenient solution, that do not require any additional expensive equipment (e.g. RFID cards, fingerprint readers, retinal scanners), can assure such security is highly wanted. Therefore, a number of publications have been devoted to methods of user authentication based on their biometrical characteristics (that are obviously individual and can be easily used to encrypt users’ credentials) and one potentially most accessible group of methods is build on top of analysis of users’ personal typing styles. This paper is a presentation of a data evolution method used in our novel biometrical authentication procedure and contains a statistical analysis of the conducted experimental verification.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Azevedo, G.L., Cavalcanti, G.D., Filho, E.C.B.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, IJCNN 2007, pp. 1947–1952. IEEE (2007) Azevedo, G.L., Cavalcanti, G.D., Filho, E.C.B.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, IJCNN 2007, pp. 1947–1952. IEEE (2007)
2.
go back to reference Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)CrossRef Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)CrossRef
3.
go back to reference Carpenter, G.A., Grossberg, S.: Adaptive Resonance Theory. Springer, Heidelberg (2011) Carpenter, G.A., Grossberg, S.: Adaptive Resonance Theory. Springer, Heidelberg (2011)
4.
go back to reference Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report (1980) Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report (1980)
5.
go back to reference Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)CrossRefMATH Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)CrossRefMATH
6.
go back to reference Guven, A., Sogukpinar, I.: Understanding users’ keystroke patterns for computer access security. Comput. Secur. 22(8), 695–706 (2003)CrossRef Guven, A., Sogukpinar, I.: Understanding users’ keystroke patterns for computer access security. Comput. Secur. 22(8), 695–706 (2003)CrossRef
7.
go back to reference Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)CrossRef Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)CrossRef
8.
go back to reference Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)CrossRef Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)CrossRef
9.
go back to reference Kozierkiewicz-Hetmańska A., Marciniak A., Pietranik M.: User authentication method based on keystroke dynamics, Paper submitted on ICCCI 2016 conference (2016) Kozierkiewicz-Hetmańska A., Marciniak A., Pietranik M.: User authentication method based on keystroke dynamics, Paper submitted on ICCCI 2016 conference (2016)
10.
go back to reference De Magalhães, S.T., Revett, K., Santos, H.: Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices, NWeSP 2005. IEEE (2005) De Magalhães, S.T., Revett, K., Santos, H.: Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices, NWeSP 2005. IEEE (2005)
11.
go back to reference Marciniak A.: Uwierzytelnianie użytkowników oparte o analizę dynamiki pisania na klawiaturze. Master thesis (2016, in Polish) Marciniak A.: Uwierzytelnianie użytkowników oparte o analizę dynamiki pisania na klawiaturze. Master thesis (2016, in Polish)
12.
go back to reference Monrose F., Rubin A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997) Monrose F., Rubin A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)
13.
go back to reference Montalvao, J., Almeida, C.A.S., Freire, E.O.: Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, pp. 560–565. IEEE (2006) Montalvao, J., Almeida, C.A.S., Freire, E.O.: Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, pp. 560–565. IEEE (2006)
14.
go back to reference Revett, K.: A bioinformatics based approach to behavioural biometrics. In: Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007, pp. 665–670. IEEE (2007) Revett, K.: A bioinformatics based approach to behavioural biometrics. In: Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007, pp. 665–670. IEEE (2007)
15.
go back to reference Robinson, J.A., Liang, V.M., Chambers, J., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 28(2), 236–241 (1998)CrossRef Robinson, J.A., Liang, V.M., Chambers, J., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 28(2), 236–241 (1998)CrossRef
16.
go back to reference Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier (2009) Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier (2009)
17.
go back to reference Yong, S., Lai, W.-K., Goghill, G.: Weightless neural networks for typing biometrics authentication. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS(LNAI), vol. 3214, pp. 284–293. Springer, Heidelberg (2004)CrossRef Yong, S., Lai, W.-K., Goghill, G.: Weightless neural networks for typing biometrics authentication. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS(LNAI), vol. 3214, pp. 284–293. Springer, Heidelberg (2004)CrossRef
18.
go back to reference Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Comput. Secur. 23(5), 428–440 (2004)CrossRef Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Comput. Secur. 23(5), 428–440 (2004)CrossRef
Metadata
Title
Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics
Authors
Adrianna Kozierkiewicz-Hetmanska
Aleksander Marciniak
Marcin Pietranik
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-45243-2_35

Premium Partner