Continuous verification using keystroke dynamics

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

47 Scopus citations

Abstract

Traditionally user authentication is based on a username and password. However, a logged station is still vulnerable to imposters when the user leaves her computer without logging-off. Keystroke dynamics methods can be useful for continuously verifying a user once the authentication process has successfully ended. However, current methods require long sessions and significant amounts of keystrokes to reliably verify users. We propose a new method that compactly represents the keystroke patterns by joining similar pairs of consecutive keystrokes. This automatically created representation reduces the session size required for inducing the user's verification model. The proposed method was evaluated on 21 legitimate users and 165 attackers. The results were encouraging and suggest that the detection performance of the proposed method is better than that of existing methods. Specifically we attained a false acceptance rate (FAR) of 3.47% and false rejection rate (FRR) of 0% using only 250 keystrokes.

Original languageEnglish
Title of host publicationProceedings - 2010 International Conference on Computational Intelligence and Security, CIS 2010
Pages411-415
Number of pages5
DOIs
StatePublished - 1 Dec 2010
Event2010 International Conference on Computational Intelligence and Security, CIS 2010 - Nanning, China
Duration: 11 Dec 201014 Dec 2010

Publication series

NameProceedings - 2010 International Conference on Computational Intelligence and Security, CIS 2010

Conference

Conference2010 International Conference on Computational Intelligence and Security, CIS 2010
Country/TerritoryChina
CityNanning
Period11/12/1014/12/10

Keywords

  • Biometrics
  • Computer security
  • Free text
  • Keystroke dynamics
  • User verification

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Continuous verification using keystroke dynamics'. Together they form a unique fingerprint.

Cite this