A Keystroke Dynamics Based Approach for Continuous Authentication | SpringerLink
Skip to main content

A Keystroke Dynamics Based Approach for Continuous Authentication

  • Conference paper
Beyond Databases, Architectures, and Structures (BDAS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 424))

  • 1471 Accesses

Abstract

In this paper, we present the application of keystroke dynamics for continuous user authentication in desktop platform. We show the differences between static and continuous systems based on keystroke dynamics in terms of creating the template and authentication phase. The key factor in the continuous authentication system is monitoring the genuineness of the user during the whole session, and not only at log-in. Moreover, we propose a general approach for continuous authentication based on keystroke dynamics. In our experiments, we use the email application as a case study to present the effectiveness and efficiency of our proposed approach. Our main conclusion is that using keystroke dynamics can serve as a feasible and acceptable measure for continuous user authentication. The investigations have shown that it is feasible to authenticate users based on keystroke dynamics for continuous authentication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bours, P.: Continuous keystroke dynamics: A different perspective towards biometric evaluation. Journal of Information Security 17(1), 36–43 (2012)

    Google Scholar 

  2. Bours, P., Barghouthi, H.: Continuous authentication using biometric keystroke dynamics. In: Proceedings of the Norwegian Information Security Conference, Norweg (2009)

    Google Scholar 

  3. Chirillo, J., Blaul, S.: Implementing Biometric Security, 1st edn. Wiley Pub. (2003)

    Google Scholar 

  4. Choras, M., Mroczkowski, P.: Keystroke dynamics for biometrics. In: Proceedings of the 8th International Conference, Warsaw, Poland (2007)

    Google Scholar 

  5. Damiani, E., Gianini, G.: Navigation dynamics as a biometrics for authentication. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 832–839. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. El Menshawy, D., Mokhtar, H.M.O., Hegazy, O.: Enhanced authentication mechanisms for desktop platform and smart phones. International Journal of Advanced Computer Science and Applications 3(10), 100–106 (2012)

    Google Scholar 

  7. Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)

    Google Scholar 

  8. Giot, R., El-Abed, M., Rosenberger, C.: Keystroke dynamics with low constraints svm based passphrase enrollment. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)

    Google Scholar 

  9. Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis. In: Proceedings of the 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Greece (2012)

    Google Scholar 

  10. Gunetti, D., Picardi, C., Ruffo, G.: Keystroke analysis of different languages: A case study. In: Famili, A.F., Kok, J.N., Peña, J.M., Siebes, A., Feelders, A. (eds.) IDA 2005. LNCS, vol. 3646, pp. 133–144. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Jain, A., Ross, A., Pankanti, S.: Biometrics: A tool for information security. IEEE Transactions on Information Foresnsics and Security 1(2), 125–143 (2006)

    Article  Google Scholar 

  12. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  13. Kang, P., Hwang, S.-s., Cho, S.: Continual retraining of keystroke dynamics based authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 1203–1211. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Kapczynski, A., Kasprowski, P., Kuzniacki, P.: User authentication based on behavioral patterns. International Scientific Journal of Computing 6(1), 75–79 (2007)

    Google Scholar 

  15. Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Journal of Applied Soft Computing 11(2), 2406–2418 (2011)

    Article  Google Scholar 

  16. Kizza, J.M.: Ethical and Social Issues in the Information Age, Texts in Computer Science, 4th edn. Springer (2010)

    Google Scholar 

  17. Kumar, S., Sim, T., Janakiraman, R., Zhang, S.: Using continuous biometric verification to protect interactive login sessions. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 687–700 (2007)

    Article  Google Scholar 

  18. Lau, E., Liu, X., Xiao, C., Yu, X.: Enhanced user authentication through keystroke biometrics. Final project report, Massachusetts Institute of Technology (December 2004)

    Google Scholar 

  19. Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Journal of Future Generation Computer Systems 16(4), 351–359 (2000)

    Article  Google Scholar 

  20. Omote, K., Okamoto, E.: User identification system based on biometrics for keystroke. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 216–229. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  21. Shanmugapriya, V., Padmavathi, G.: Keystroke dynamics authentication using neural network approaches. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 686–690. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  22. Stefan, D., Shu, X., Yao, D.: Robustness of keystroke dynamics based biometrics against synthetic forgeries. Journal of Computers and Security 31(1), 109–121 (2011)

    Article  Google Scholar 

  23. Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: Keystroke dynamics in password authentication enhancement. Journal of Expert Systems with Applications 37(12), 8079–8089 (2010)

    Article  Google Scholar 

  24. Van Den Broek, E.L.: Beyond biometrics. In: Proceedings of the International Conference on Computational Science, The Netherlands (2010)

    Google Scholar 

  25. Yampolskiy, R.: Computer Analysis of Human Behavior, 1st edn. Springer (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dina El Menshawy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

El Menshawy, D., Mokhtar, H.M.O., Hegazy, O. (2014). A Keystroke Dynamics Based Approach for Continuous Authentication. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures, and Structures. BDAS 2014. Communications in Computer and Information Science, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-06932-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06932-6_40

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06931-9

  • Online ISBN: 978-3-319-06932-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics