Abstract
Keystroke dynamics is the process of identifying individual users on the basis of their distinctive typing rhythms. Most current approaches implicitly assume that individual typing behavior has high consistency as well as high discriminatory ability, both of which underpin the power of the technique. However, no earlier work has been done to quantify or measure the consistency of typing behavior. This study aims to investigate the consistency of users’ typing behavior in keystroke dynamics. We obtain a keystroke benchmark dataset, propose a consistency measurement model, develop an evaluation methodology, and conduct three studies. We first quantify the consistency of users’ behavior in repeatedly typing a password, observing that a typical user’s typing behavior would become consistent over time, and changes in her typing would diminish. We then measure the consistency of keystroke timing features, finding that the combination of all features has the best consistency and smallest fluctuation. We finally examine the effect of consistency on keystroke-biometric systems, observing that the authentication performance gets better as the user’s typing behavior becomes more consistent.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Rosenbaum, D.A., Carlson, R.A., Gilmore, R.O.: Acquisition of Intellectual and Perceptual-Motor Skills. Annual Review of Psychology 52, 453–470 (2001)
Yitzhaki, S.: Gini’s Mean Difference: a Superior Measure of Variability for Non-Normal Distributions. METRON-Int’l J. Statistics 285–316 (2003)
Forsen, G., Nelson, M., Staron, R.: Personal Attributes Authentication Techniques., Tech. Report RADC-TR-77-1033, Griffis Air Force Base (1977)
Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Intell. Data Anal. 7(5), 469–496 (2003)
Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367–397 (2002)
Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Preliminary Results (1980)
Joyce, R., Gupta, G.: Identity Authentication based on Keystroke Latencies. Commun. ACM 33(2), 168–176 (1990)
Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Dowland, P., Furnell, S.A.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph, and Keyword Latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems. IFIP International Federation for Information Processing, vol. 147, pp. 275–289. Springer, Heidelberg (2004)
Gunetti, D., Picardi, C.: Keystroke Analysis of Free Text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)
Araujo, L.C.F., Sucupira, L.H.R., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T.: User Authentication through Typing Biometrics Features. IEEE Trans. Signal Process. 53(2), 851–855 (2005)
Killourhy, K.S., Maxion, R.A.: Comparing Anomaly Detectors for Keystroke Dynamics. In: Proc. Annual Int’l Conf. Dependable Systems and Networks, pp. 125–134 (2009)
Bartmann, D., Bakdi, I., Achatz, M.: On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. Int’l J. Infor. Secur. Priva. 1(2), 1–12 (2007)
Kang, P., Hwang, S.-s., Cho, S.: Continual Retraining of Keystroke Dynamics based Authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 1203–1211. Springer, Heidelberg (2007)
Cialdini, R.B.: Influence: Science and practice. Needham Heights (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Shen, C., Maxion, R.A., Cai, Z. (2013). A Study of the Consistency in Keystroke Dynamics. In: Sun, Z., Shan, S., Yang, G., Zhou, J., Wang, Y., Yin, Y. (eds) Biometric Recognition. CCBR 2013. Lecture Notes in Computer Science, vol 8232. Springer, Cham. https://doi.org/10.1007/978-3-319-02961-0_51
Download citation
DOI: https://doi.org/10.1007/978-3-319-02961-0_51
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02960-3
Online ISBN: 978-3-319-02961-0
eBook Packages: Computer ScienceComputer Science (R0)