CFP last date
20 December 2024
Reseach Article

Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm

by Rohit A. Patil, Amar L. Renke
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 9
Year of Publication: 2016
Authors: Rohit A. Patil, Amar L. Renke
10.5120/ijca2016910432

Rohit A. Patil, Amar L. Renke . Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm. International Journal of Computer Applications. 144, 9 ( Jun 2016), 27-33. DOI=10.5120/ijca2016910432

@article{ 10.5120/ijca2016910432,
author = { Rohit A. Patil, Amar L. Renke },
title = { Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 9 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number9/25209-2016910432/ },
doi = { 10.5120/ijca2016910432 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:12.856633+05:30
%A Rohit A. Patil
%A Amar L. Renke
%T Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 9
%P 27-33
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this era computer security is an important issue now a days because these are used everywhere to store & process the sensitive data. Specially those used in e-banking, e-commerce, virtual offices, e-learning, distributed, computing & various services over the internet. Using Keystroke dynamics authentication technology can be secured by password from various attacks. This technique is based on human behavior to type their password. Here analysis is done using human behavior with their typing pattern. As keystroke dynamics does not require any hardware, no extra hardware is used. Only software based technology is required for password protection. The result provides emphasis with pleasure security that growing in demand in web-based application.

References
  1. B.Miller, “Vital signs of identity” IEEE spectrum, 1994, pp 22 30.
  2. M. Dash and H. Liu, “Feature Selection for Classification”, inIntelligent Data Analysis 1, 1997, pp. 131-156.
  3. Ron Kohavi and George H. John, “Wrappers for Feature SubsetSelection”, in Artificial Intelligence, 1997, pp. 273-324.
  4. Huan Liu and Hiroshi Motoda,”Feature Selection for Knowledge Discovery and Data Mining”, Boston: Kluwer Academic, 1998.
  5. M. Hall, Correlation based feature selection for machine learning, Doctoral dissertation, University of Waikato, 1999.
  6. CENELEC. European Standard EN 50133-1: Alarm systems access ontrol systems for use in security applications. Part 1: System requirements. European Committee for Electro technical Standardization, 2002.
  7. Enzhe Yu and Sungzoon Cho, “Keystroke dynamics identity verification-its problems and practical solutions”, in Computers & Security, vol 23, 2004, pp 428-440.
  8. Huan Liu and Lei Yu, “Toward Integrating Feature SelectionAlgorithms for Classification and Clustering” IEEE Transactions on knowledge and data engineering, vol. 17, no. 4, 2005, pp 491-502.
  9. Yong Sheng, Vir V. Phoha and Steven M. Rovnyak ,” A Parallel Decision Tree-Based Method for User Authentication Based on Keystroke Patterns”, IEEE Transactions On Systems, Man, And Cybernetics—Part B: Cybernetics, vol. 35, No. 4, 2005, pp 826-833.
  10. William E. Burr, Donna F. Dodson and W. Timothy Polk, Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (NIST), 2006, pp 800-63.
  11. Lee Hyoung-joo and Cho Sungzoon ,”Retraining a keystrokedynamics-based authenticator with impostor patterns”, in Computers & Security, vol 26 , 2007, pp 300-310.
  12. Ozge Uncu , I.B. Turksen, “ A novel feature selection approach: Combining feature wrappers and filters”, in Information Sciences 177, 2007, pp 449-466.
  13. Jinjie Huang, Yunze Cai and Xiaoming Xu, “A hybrid genetic algorithm for feature selection wrapper based on mutual information.” In Pattern Recognition Letters 28, 2007, pp 1825–1844.
  14. Danoush Hosseinzadeh and Sridhar Krishnan,” Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications”, IEEE transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 38, no. 6, 2008,pp 816-826.
  15. K. Killourhy and R. Maxion ,” The Effect of Clock Resolution on Keystroke Dynamics,” in Recent Advances in Intrusion Detection, vol 5230 , 2008, pp 331–350.
  16. M.E ElAlami ,”A filter model for feature subset selection based on genetic algorithm”, in Knowledge-Based Systems 22, 2009, pp 356–362.
  17. Marcus Karnan, M. Akila and A. Kalamani , “ Feature subset selection in keystroke dynamics using ant colony optimization” in Journal of Engineering and Technology Research ,vol.1 (5), 2009, pp 072-080.
  18. Kevin S. Killourhy and Roy A. Maxion, “Comparing Anomaly Detectors for Keystroke Dynamics,” Proceedings of the 39th Annual International Conference on Dependable Systems and Networks , pp 125- 134, 2009.
  19. P. Khanna and M. Sasikumar, “ Recognising Emotions from Keyboard Stroke Pattern”, International Journal of Computer Applications, vol 11(9), 2010.
  20. Mohammad Nauman and Tamleek Ali, “TOKEN: TrustableKeystroke-Based Authentication for Web-Based Applications onSmartphones,” Springer-Verlag Berlin Heidelberg, 2010, pp 286-297.
  21. M. Karnan, M. Akila and N. Krishnaraj,” Biometric personal Authentication using keystroke dynamics: A review,”in Applied Soft Computing , vol 11, 2011, pp 1565–1573.
  22. Kiran S. Balagani , Vir V. Phoha , Asok Ray and Shashi Phoha ,” On the discriminability of keystroke feature vectors used in fixed text keystroke authentication”, in Pattern Recognition Letters 32, 2011, pp 1070–1080.
  23. Benjamin Purgason and David Hibler, “Security through Behavioural Biometrics and Artificial Intelligence”, Procedia Computer Science, vol 12, 2012, pp 398 – 403.
  24. Ting-Yi Chang, “Dynamically generate a long-lived private key based on password keystroke features and neural network,” Information Sciences 211, pp 36–47, 2012.
  25. Pablo Bermejo, Jose A. Gamez and Jose M. Puerta , “ A GRASPalgorithm for fast hybrid (filter-wrapper) feature subset selection in highdimensional datasets”, in Pattern Recognition Letters, vol 32, 2011, pp 701–711.
  26. Alon Schclar, Lior Rokach, Adi Abramson, and Yuval Elovici , “User Authentication Based on Representative Users”, IEEE Transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 42, no. 6,pp 1669-1678, 2012.
  27. Salil P. Banerjee, Damon L. Woodard, “Biometric Authentication and Identification using Keystroke Dynamics: A Survey”, Journal of Pattern Recognition Research 7, pp 116-139, 2012.
  28. Patrick Bours, “Continuous keystroke dynamics: A different perspective towards biometric evaluation”, in Information SecurityTechnical Report 17, 2012, pp 36-43.
  29. Amir-Massoud Bidgoli, Mehdi Naseri Parsa, “A Hybrid Feature Selection by Resampling, Chi squared and Consistency Evaluation Techniques”, World Academy of Science, Engineering and Technology, vol 6, 2012, pp 230-239.
  30. Salil P. Banerjee, Damon L. Woodard, “Biometric Authentication and Identification using Keystroke Dynamics: A Survey”, Journal of Pattern Recognition Research 7, pp 116-139, 2012.
  31. Ahmed A. Ahmed and Traore Issa, “Biometric Recognition Based on Free-Text Keystroke Dynamics”, IEEE Transactions on cybernetics, 2013.
  32. Khandaker A. Rahman , Kiran S. Balagani , Vir V. Phoha ,”Snoop- Forge-Replay Attacks on Continuous verification with Keystrokes”, IEEE Transactions on information forensics and security, vol. 8, no. 3, pp 528-541, 2013.
  33. Fudong Li, Nathan Clarke, Maria Papadaki and Paul Dowland, Active authentication for mobile devices utilizing behavior profiling,” International Journal of information Security, Springer-Verlag Berlin Heidelberg, 2013.
  34. Kasem Wangsuk and Tanapat Anusas-amornkul,” Trajectory Mining for Keystroke Dynamics Authentication.”, in Procedia Computer Science 24, 2013, pp175 – 183.
  35. Pablo Bermejo, Jose A. Gamez and Jose M. Puerta, “Speeding up incremental wrapper feature subset selection with Naïve Bayes classifier,” Knowledge-Based Systems 55, pp 140–147, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Keystroke dynamics typing authentication & identification feature.