Skip to main content

A Study of the Consistency in Keystroke Dynamics

  • Conference paper
Biometric Recognition (CCBR 2013)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 8232))

Included in the following conference series:

  • 2403 Accesses

Abstract

Keystroke dynamics is the process of identifying individual users on the basis of their distinctive typing rhythms. Most current approaches implicitly assume that individual typing behavior has high consistency as well as high discriminatory ability, both of which underpin the power of the technique. However, no earlier work has been done to quantify or measure the consistency of typing behavior. This study aims to investigate the consistency of users’ typing behavior in keystroke dynamics. We obtain a keystroke benchmark dataset, propose a consistency measurement model, develop an evaluation methodology, and conduct three studies. We first quantify the consistency of users’ behavior in repeatedly typing a password, observing that a typical user’s typing behavior would become consistent over time, and changes in her typing would diminish. We then measure the consistency of keystroke timing features, finding that the combination of all features has the best consistency and smallest fluctuation. We finally examine the effect of consistency on keystroke-biometric systems, observing that the authentication performance gets better as the user’s typing behavior becomes more consistent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rosenbaum, D.A., Carlson, R.A., Gilmore, R.O.: Acquisition of Intellectual and Perceptual-Motor Skills. Annual Review of Psychology 52, 453–470 (2001)

    Article  Google Scholar 

  2. Yitzhaki, S.: Gini’s Mean Difference: a Superior Measure of Variability for Non-Normal Distributions. METRON-Int’l J. Statistics 285–316 (2003)

    Google Scholar 

  3. Forsen, G., Nelson, M., Staron, R.: Personal Attributes Authentication Techniques., Tech. Report RADC-TR-77-1033, Griffis Air Force Base (1977)

    Google Scholar 

  4. Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Intell. Data Anal. 7(5), 469–496 (2003)

    Google Scholar 

  5. Bergadano, F., Gunetti, D., Picardi, C.: User Authentication through Keystroke Dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367–397 (2002)

    Article  Google Scholar 

  6. Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by Keystroke Timing: Some Preliminary Results (1980)

    Google Scholar 

  7. Joyce, R., Gupta, G.: Identity Authentication based on Keystroke Latencies. Commun. ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  8. Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  9. Dowland, P., Furnell, S.A.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph, and Keyword Latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems. IFIP International Federation for Information Processing, vol. 147, pp. 275–289. Springer, Heidelberg (2004)

    Google Scholar 

  10. Gunetti, D., Picardi, C.: Keystroke Analysis of Free Text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)

    Article  MATH  Google Scholar 

  11. Araujo, L.C.F., Sucupira, L.H.R., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T.: User Authentication through Typing Biometrics Features. IEEE Trans. Signal Process. 53(2), 851–855 (2005)

    Article  MathSciNet  Google Scholar 

  12. Killourhy, K.S., Maxion, R.A.: Comparing Anomaly Detectors for Keystroke Dynamics. In: Proc. Annual Int’l Conf. Dependable Systems and Networks, pp. 125–134 (2009)

    Google Scholar 

  13. Bartmann, D., Bakdi, I., Achatz, M.: On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. Int’l J. Infor. Secur. Priva. 1(2), 1–12 (2007)

    Article  Google Scholar 

  14. Kang, P., Hwang, S.-s., Cho, S.: Continual Retraining of Keystroke Dynamics based Authenticator. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 1203–1211. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Cialdini, R.B.: Influence: Science and practice. Needham Heights (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Shen, C., Maxion, R.A., Cai, Z. (2013). A Study of the Consistency in Keystroke Dynamics. In: Sun, Z., Shan, S., Yang, G., Zhou, J., Wang, Y., Yin, Y. (eds) Biometric Recognition. CCBR 2013. Lecture Notes in Computer Science, vol 8232. Springer, Cham. https://doi.org/10.1007/978-3-319-02961-0_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02961-0_51

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02960-3

  • Online ISBN: 978-3-319-02961-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics