Authenticating Mobile Phone User using Keystroke Dynamics
DOI:
https://doi.org/10.26438/ijcse/v6i12.372377Keywords:
Keystroke dynamics, Typing behaviour, Mobile, Authentication, BiometricsAbstract
Since few decades, the simple password authentication has either replaced or compounded with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security. Keystroke Dynamics is behavioral biometrics that can perform continuous authentication to detect intruders. In this paper, we investigate whether user specific password gives better performance than artificially rhythmed password. Also, impact of sensory data on overall performance of the system is examined. Finally, Genetic Algorithm is used to optimize the features. The features used to analyze the user data were hold time, flight time and X, Y and Z axis reading from accelerometer sensor. Results showed that user data gives better performance than artificially rhythmed passwords. Best accuracy of around 90% was achieved by using user specified passwords and optimizing the results with genetic algorithm.
References
[1] S. Bhatt and T. Santhanam, “Keystroke dynamics for biometric authentication - A survey,” 2013 Int. Conf. Pattern Recognition, Informatics Mob. Eng., pp. 17–23, 2013.
[2] F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication,” Futur. Gener. Comput. Syst., vol. 16, no. 4, pp. 351–359, 2000.
[3] I. Bhardwaj, N. D. Londhe, and S. K. Kopparapu, “Study of imposter attacks on novel fingerprint dynamics based verification system,” IEEE Access, vol. 5, pp. 595–606, 2017.
[4] R. Solanki and P. Shukla, “Estimation of the User’s Emotional State by Keystroke Dynamics,” Int. J. Comput. Appl., vol. 94, no. 13, pp. 21–23, 2014.
[5] N. L. Clarke, S. M. Furnell, B. M. Lines and P. L. Reynolds, “Keystroke dynamics on a mobile handset: a feasibility study,” Information Management & Computer Security, vol. 11, no. 4, pp. 161–166, 2003.
[6] T. Sim and R. Janakiraman, “Are digraphs good for free-text keystroke dynamics?,” Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2007.
[7] K. S. Killourhy and R. Maxion, “Comparing Anomaly Detectors for Keystroke Dynamics,” IEEE Computer Society Press, Los Alamitos, California, pp. 125–134, 2009.
[8] S. Hwang, S. Cho, and S. Park, “Keystroke dynamics-based authentication for mobile devices. Computers and Security, vol. 28, no. 2, pp. 85–93, 2003.
[9] R. Giot, M. El-Abed and C. Rosenberger, “GREYC keystroke: A benchmark for keystroke dynamics biometric systems. IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS, 2009.
[10] Y. Li, B. Zhang, Y. Cao, S. Zhao, Y. Gao and J. Liu, “Study on the BeiHang Keystroke Dynamics Database,” In International Joint Conference on Biometrics, pp. 1-5, 2011.
[11] J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie, “Computer user verification using login string keystroke dynamics,” IEEE Trans. Syst. Man, Cybern. Part ASystems Humans., vol. 28, no. 2, pp. 236–241, 1998.
[12] S. Haider, A. Abbas, and A. K. Zaidi, “A multi-technique approach for user identification through keystroke dynamics,” IEEE Int. Conf. Syst. man Cybern., vol. 2, pp. 1336–1341, 2000.
[13] F. Gutiérrez, “Biometrics and data mining: Comparison of data mining-based keystroke dynamics methods for identity verification,” MICAI 2002 Adv. …, pp. 460–469, 2002.
[14] V. Kacholia and S. Pandit, “Biometric Authentication using Random Distributions (BioART),” Proc. 15th Can. IT Secur. Symp. Canada, vol. 5, pp. 1–8, 2003.
[15] L. C. Freire Araujo, M. Gustavo Lizarraga, L. H. Rabelo Sucupira, J. B. Tadanobu Yabu-uti, and L. L. Lee, “Typing Biometrics User Authentication based on Fuzzy Logic,” Lat. Am. Trans. IEEE (Revista IEEE Am. Lat., vol. 2, no. 1, pp. 69–74, 2004.
[16] W. E. Eltahir, M. J. E. Salami, A. F. Ismail, and W. K. Lai, “Dynamic keystroke analysis using AR model,” Industrial Technology, 2004. IEEE ICIT ’04. 2004 IEEE International Conference on, vol. 3. p. 1555–1560 Vol. 3, 2004.
[17] Y. Sang, H. Shen, and P. Fan, “Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine,” Lect. Notes Comput. Sci., vol. 3320, pp. 666–669, 2004.
[18] S. S. Joshi and V. V. Phoha, “Investigating hidden Markov models capabilities in anomaly detection,” in Proceedings of the 43rd annual southeast regional conference on - ACM-SE 43, vol. 1, 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
