Browse > Article
http://dx.doi.org/10.7232/IEIF.2012.25.3.290

A Study on User Authentication based on Keystroke Dynamics of Long and Free Texts  

Kang, Pil-Sung (Department of Industrial and Information Systems Engineering, Seoul National University of Science and Technology (Seoultech))
Cho, Sung-Zoon (Industrial Engineering, Seoul National University)
Publication Information
IE interfaces / v.25, no.3, 2012 , pp. 290-299 More about this Journal
Abstract
Keystroke dynamics refers to a way of typing a string of characters. Since one has his/her own typing behavior, one's keystroke dynamics can be used as a distinctive biometric feature for user authentication. In this paper, two authentication algorithms based on keystroke dynamics of long and free texts are proposed. The first is the K-S score, which is based on the Kolmogorov-Smirnov test, and the second is the 'R-A' measure, which combines 'R' and 'A' measures proposed by Gunetti and Picardi (2005). In order to verify the authentication performance of the proposed algorithms, we collected more than 3,000 key latencies from 34 subjects in Korean and 35 subjects in English. Compared with three benchmark algorithms, we found that the K-S score was outstanding when the reference and test key latencies were not sufficient, while the 'R-A' measure was the best when enough reference and test key latencies were provided.
Keywords
keystroke dynamics; user authentication; free texts; kolmogorov-smirnov test; R-A measure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Bleha, S., Slivinsky, C., and Hussien, B. (1990), Computer-access Security Systems using Keystroke Dynamics, IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(12), 1217-1222.   DOI   ScienceOn
2 Chen, W. and Chang W. (2004), Applying Hidden Markov Models to Keystroke Pattern Analysis for Password Verification, Proc. 2004 IEEE Int. Conf. on Information Reuse and Integration, 467-474.
3 Crawford, H. (2010), Keystroke Dynamics : Characteristics and Opportunities, Proc. Int, Conf. on Privacy, Security, and Trust, 205-212.
4 Filho, J. R. M. and Freire, E. O. (2006), On the Equalization of Keystroke Timing Histograms, Pattern Recognition, 27(13), 1440-1446.   DOI   ScienceOn
5 Frank, J. and Massey, Jr. (1951), The Kolmogorov-Smirnov Test for Goodness of Fit, Journal of the American Statistical Association, 46(253), 68-78.   DOI   ScienceOn
6 Furnell, S. and Clarke, N. (2005), Biometrics : No Silver Bullets, Computer Fraud and Security, 2005(8), 9-14.   DOI   ScienceOn
7 Giot, R., Hemery, B., and Rosenberger, C. (2010), Low Cost and Usable Multimodal Biometric System based on Keystroke Dynamics and 2D Face Recognition, Proc. Int. Conf. on Pattern Recognition, 1128-1131.
8 Gunetti, D. and Picardi, C. (2005), Keystroke Analysis of Free Text, ACM Transaction on Information System Security, 8(3), 312-347.   DOI
9 Hosseinzadeh, D. and Krishnan, S. (2008), Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications, IEEE Transactions on Systems, Man, and Cybernetics-Part C : Applications and Reviews, 38(6), 816-826.   DOI
10 Hu, J., Gingrich, D., and Sentosa, A. (2007), A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics, Proc. 2007 IEEE Int. Conf. on Communications, 1156-1560.
11 Jain, A. K., Bolle, R., and Pankanti, S. (1999), Biometrics : Personal Identification in Networked Society, Kluwer, Massachusetts, USA.
12 Kang, P. and Cho, S. (2009), A Hybrid Novelty Score and Its Use in Keystroke Dynamics-based User Authentication, Pattern Recognition, 42(11), 3115-3127.   DOI   ScienceOn
13 Kang, P., Park, S., Hwang, S., Lee, H., and Cho, S. (2008), Improvement of Keystroke Data Quality through Artificial Rhythms and Cues, Computers and Security, 27(1-2), 3-11.   DOI   ScienceOn
14 Monrose, F., Reither, M. K., and Wetzel, S. (2002), Password Hardening based on Keystroke Dynamics, International Journal of Information Security, 1(2), 69-83.   DOI   ScienceOn
15 Monrose, F. and Rubin, A. D. (2000), Keystroke Dynamics as a Biometric for Authentication, Future Generation Computer Systems, 16(4), 351-359.   DOI   ScienceOn
16 Peacock, A., Ke, X., and Wilkerson, M. (2004), Typing Patterns : A Key to User Identification, IEEE Security and Privacy, 2(5), 40-47.
17 Prabhakar, S., Pankanti, S., and Jain, A. K. (2003), Biometric Recognition : Security and Privacy Concerns, IEEE Security and Privacy, 1(2), 33-42.   DOI   ScienceOn
18 Sheng, Y., Phoha, V. V., and Rovnyak, S. M. (2005), A Parallel Decision Treebased Method for User Authentication based on Keystroke Patterns, IEEE Transactions on Systems, Man, and Cybernetics-Part B : Cybernetics, 35(4) 826-833.   DOI   ScienceOn
19 Subashini, S. and Kavitha, V. (2011), A Survey on Security Issues in Service Delivery Models of Cloud Computing, Journal of Network and Computer Applications, 34(1), 1-11.   DOI   ScienceOn
20 Sinthupinyo, S., Roadrungwasinkul, W., and Chantan, C. (2009), User Recognition via Keystroke Latencies using SOM and Backpropagation Neural Network, Proc. Int. Joint Conf. on Institute of Control, Robotics, and Systems (ICROS) and Society of Instrument and Control Engineers (SICE), 3160-3165.
21 Yager, N. and Dunstone, Y. (2010), The Biometric Menagerie, IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(2), 220-230.   DOI
22 Yan, J., Blackwell, A., Anderson, R., and Grant, A. (2004), Password Memorability and Security : Empirical Results, IEEE Security and Privacy, 2(5), 25-31.   DOI
23 Zhang, Y., Chang, G., Liu, L., and Jia, J. (2010), Authenticating User's Keystroke based on Statistical Models, Proc. 4th Int. Conf. on Genetic and Evolutionary Computing, 578-581.
24 Zissis, D. and Lekkas, D. (2010), Addressing Cloud Computing Security Issues, Future Generation Computer Systems doi:10.1016/j.future.2010.12.006.   DOI   ScienceOn