Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text
M. Rathi1 , A. V. Senthil Kumar2
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 780-785, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.780785
Online published on Jan 31, 2019
Copyright © M. Rathi, A. V. Senthil Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M. Rathi, A. V. Senthil Kumar, “Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.780-785, 2019.
MLA Style Citation: M. Rathi, A. V. Senthil Kumar "Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text." International Journal of Computer Sciences and Engineering 7.1 (2019): 780-785.
APA Style Citation: M. Rathi, A. V. Senthil Kumar, (2019). Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text. International Journal of Computer Sciences and Engineering, 7(1), 780-785.
BibTex Style Citation:
@article{Rathi_2019,
author = {M. Rathi, A. V. Senthil Kumar},
title = {Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {780-785},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3583},
doi = {https://doi.org/10.26438/ijcse/v7i1.780785}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.780785}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3583
TI - Exploration of Keystroke Dynamics Based Authentication on Fixed-Text and on Free-Text
T2 - International Journal of Computer Sciences and Engineering
AU - M. Rathi, A. V. Senthil Kumar
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 780-785
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
422 | 432 downloads | 190 downloads |
Abstract
Computer security is the protection of computing systems and the data that is stored or accessed. It is very important to ensure that the information remains confidential and only those who should access that information can. Username and password alone are insufficient in complex applications. Hence, a strong authentication method such as Biometric authentication method is required to verify one’s identity using the unique biological characteristics of an individual. Existing security approaches can be strengthened by one of the behavioral biometric based technique known as Keystroke Dynamics. The main objective of this paper is to explore particularly on Keystroke Dynamics based Authentication (KDA). This technique can be applied in different domains like intrusion detection, online learning and assessment, e-banking etc., to authenticate the users. This paper presents a review of its applications using fixed-text (static passwords) and free-text (continuous). Comparing these two types of keystroke authentication methods, Free-text kind of authentication process was found to be better as it is not limited with username and password during the log-in session; it is continued until the end of the log-on session.
Key-Words / Index Term
Authentication, Keystroke dynamics, Behavioral Biometrics, Fixed Text, Free text, Biometric authentication
References
[1] M. L. Ali, J. V. Monaco, C. C. Tappert, and M. Qiu, “Keystroke Biometric Systems for User Authentication,” Journal of Signal Processing Systems, vol. 86, no. 2–3, pp. 175–190, 2017.
[2] A. Alsultan and K. Warwick, “Keystroke Dynamics Authentication: A Survey of Free-text Methods,” International Journal of Computer Science, vol. 10, no. 4, pp. 1–10, 2013.
[3] M. Karnan, M. Akila, and N. Krishnaraj, “Biometric personal authentication using keystroke dynamics : A review,” Applied Soft Computing, vol. 11, no. 2, pp. 1565–1573, 2011.
[4] A. Alshehri, F. Coenen, and D. Bollegala, “Iterative Keystroke Continuous Authentication: A Time Series Based Approach,” KI - Künstliche Intelligenz, pp. 1–13, 2018.
[5] J. Kim, H. Kim, and P. Kang, “Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection,” Applied Soft Computing Journal, vol. 62, pp. 1077–1087, 2018.
[6] I. Tsimperidis, A. Arampatzis, and A. Karakos, “Keystroke dynamics features for gender recognition,” Digital Investigation, vol. 24, pp. 4–10, 2018.
[7] A. Goodkind, D. G. Brizan, and A. Rosenberg, “Utilizing overt and latent linguistic structure to improve keystroke-based authentication,” Image and Vision Computing, vol. 58, pp. 230–238, Feb. 2017.
[8] S. Mondal and P. Bours, “A study on continuous authentication using a combination of keystroke and mouse biometrics,” Neurocomputing, vol. 230, no. October 2016, pp. 1–22, 2017.
[9] P. Kang and S. Cho, “Keystroke Dynamics-based User Authentication Using Long and Free Text Strings From Various Input Devices Keystroke Dynamics-based User Authentication Using Long and Free Text Strings From Various Input Devices,” Journal of Information Sciences, vol. 308, pp. 72–93, 2015.
[10] Y. Matsubara, T. Samura, and H. Nishimura, “Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing,” Journal of Information Security, no. July, pp. 229–240, 2015.
[11] A. A. Ahmed and I. Traore, “Biometric recognition based on free-text keystroke dynamics,” IEEE Transactions on Cybernetics, vol. 44, no. 4, pp. 458–472, 2014.
[12] P. Bours, “Continuous keystroke dynamics: A different perspective towards biometric evaluation,” Information Security Technical Report, vol. 17, no. 1–2, pp. 36–43, 2012.
[13] D. Gunetti and C. Picardi, “Keystroke Analysis of Free Text,” ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 3, pp. 312–347, 2005.
[14] O. Alpar, “Frequency Spectrograms for Biometric Keystroke Authentication Using Neural Network Based Classifier,” Knowledge-Based Systems, vol. 116, pp. 163–171, 2017.
[15] J. Hu, D. Gingrich, and A. Sentosa, “Authentication through Biometric Keystroke Dynamics,” IEEE International Conference on Communications, pp. 1556–1560, 2008.
[16] S. Z. Syed Idrus, E. Cherrier, C. Rosenberger, and P. Bours, “Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords,” Computers and Security, vol. 45, pp. 147–155, 2014.
[17] F. Bergadano, D. Gunetti, and C. Picardi, “User authentication through keystroke dynamics,” ACM Transactions on Information and System Security, vol. 5, no. 4, pp. 367–397, 2002.
[18] C. H. Jiang, S. Shieh, and J. C. Liu, “Keystroke statistical learning model for web authentication,” ASIACCS ’07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 359–361, 2007.
[19] R. K. Das, S. Mukhopadhyay, and P. Bhattacharya, “User authentication based on keystroke dynamics,” IETE Journal of Research, vol. 60, no. 3, pp. 229–239, 2014.
[20] M. Karnan, M. Akila, and A. Kalamani, “Feature subset selection in keystroke dynamics using ant colony optimization,” Journal of Engineering and Technology Research, vol. 1, no. 5, pp. 72–80, 2009.
[21] A. Bhatia and M. Hanmandlu, “Keystroke Dynamics Based Authentication Using Information Sets,” Journal of Modern Physics, vol. 8, no. 09, p. 1557, 2017.
[22] J. Roth, X. Liu, A. Ross, and D. Metaxas, “Biometric authentication via keystroke sound,” Proceedings - 2013 International Conference on Biometrics, ICB 2013.
[23] A. Bhatia and M. Hanmandlu, “Keystroke Dynamics Based Authentication Using Information Sets,” Journal of Modern Physics, vol. 8, no. 09, p. 1557, 2017.
[24] J. Roth, X. Liu, A. Ross, and D. Metaxas, “Biometric authentication via keystroke sound,” Proceedings - 2013 International Conference on Biometrics, ICB 2013, 2013.