Abstract
In this paper, we present the application of keystroke dynamics for continuous user authentication in desktop platform. We show the differences between static and continuous systems based on keystroke dynamics in terms of creating the template and authentication phase. The key factor in the continuous authentication system is monitoring the genuineness of the user during the whole session, and not only at log-in. Moreover, we propose a general approach for continuous authentication based on keystroke dynamics. In our experiments, we use the email application as a case study to present the effectiveness and efficiency of our proposed approach. Our main conclusion is that using keystroke dynamics can serve as a feasible and acceptable measure for continuous user authentication. The investigations have shown that it is feasible to authenticate users based on keystroke dynamics for continuous authentication systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bours, P.: Continuous keystroke dynamics: A different perspective towards biometric evaluation. Journal of Information Security 17(1), 36–43 (2012)
Bours, P., Barghouthi, H.: Continuous authentication using biometric keystroke dynamics. In: Proceedings of the Norwegian Information Security Conference, Norweg (2009)
Chirillo, J., Blaul, S.: Implementing Biometric Security, 1st edn. Wiley Pub. (2003)
Choras, M., Mroczkowski, P.: Keystroke dynamics for biometrics. In: Proceedings of the 8th International Conference, Warsaw, Poland (2007)
Damiani, E., Gianini, G.: Navigation dynamics as a biometrics for authentication. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 832–839. Springer, Heidelberg (2007)
El Menshawy, D., Mokhtar, H.M.O., Hegazy, O.: Enhanced authentication mechanisms for desktop platform and smart phones. International Journal of Advanced Computer Science and Applications 3(10), 100–106 (2012)
Giot, R., El-Abed, M., Rosenberger, C.: Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)
Giot, R., El-Abed, M., Rosenberger, C.: Keystroke dynamics with low constraints svm based passphrase enrollment. In: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), USA (2009)
Giot, R., El-Abed, M., Rosenberger, C.: Web-based benchmark for keystroke dynamics biometric systems: A statistical analysis. In: Proceedings of the 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Greece (2012)
Gunetti, D., Picardi, C., Ruffo, G.: Keystroke analysis of different languages: A case study. In: Famili, A.F., Kok, J.N., Peña, J.M., Siebes, A., Feelders, A. (eds.) IDA 2005. LNCS, vol. 3646, pp. 133–144. Springer, Heidelberg (2005)
Jain, A., Ross, A., Pankanti, S.: Biometrics: A tool for information security. IEEE Transactions on Information Foresnsics and Security 1(2), 125–143 (2006)
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)
Kang, P., Hwang, S.-s., Cho, S.: Continual retraining of keystroke dynamics based authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 1203–1211. Springer, Heidelberg (2007)
Kapczynski, A., Kasprowski, P., Kuzniacki, P.: User authentication based on behavioral patterns. International Scientific Journal of Computing 6(1), 75–79 (2007)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: A review. Journal of Applied Soft Computing 11(2), 2406–2418 (2011)
Kizza, J.M.: Ethical and Social Issues in the Information Age, Texts in Computer Science, 4th edn. Springer (2010)
Kumar, S., Sim, T., Janakiraman, R., Zhang, S.: Using continuous biometric verification to protect interactive login sessions. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 687–700 (2007)
Lau, E., Liu, X., Xiao, C., Yu, X.: Enhanced user authentication through keystroke biometrics. Final project report, Massachusetts Institute of Technology (December 2004)
Monrose, F., Rubin, A.: Keystroke dynamics as a biometric for authentication. Journal of Future Generation Computer Systems 16(4), 351–359 (2000)
Omote, K., Okamoto, E.: User identification system based on biometrics for keystroke. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 216–229. Springer, Heidelberg (1999)
Shanmugapriya, V., Padmavathi, G.: Keystroke dynamics authentication using neural network approaches. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 686–690. Springer, Heidelberg (2010)
Stefan, D., Shu, X., Yao, D.: Robustness of keystroke dynamics based biometrics against synthetic forgeries. Journal of Computers and Security 31(1), 109–121 (2011)
Teh, P.S., Teoh, A.B.J., Tee, C., Ong, T.S.: Keystroke dynamics in password authentication enhancement. Journal of Expert Systems with Applications 37(12), 8079–8089 (2010)
Van Den Broek, E.L.: Beyond biometrics. In: Proceedings of the International Conference on Computational Science, The Netherlands (2010)
Yampolskiy, R.: Computer Analysis of Human Behavior, 1st edn. Springer (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
El Menshawy, D., Mokhtar, H.M.O., Hegazy, O. (2014). A Keystroke Dynamics Based Approach for Continuous Authentication. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures, and Structures. BDAS 2014. Communications in Computer and Information Science, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-06932-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-06932-6_40
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06931-9
Online ISBN: 978-3-319-06932-6
eBook Packages: Computer ScienceComputer Science (R0)