Abstract
Security is a critical component of most computer systems – especially those used in E-commerce activities over the Internet. Global access to information makes security a critical design issue in these systems. Deployment of sophisticated hardware based authentication systems is prohibitive in all but the most sensitive installations. What is required is a reliable, hardware independent and efficient security system. In this paper, we propose an extension to a keystroke dynamics based security system. We provide evidence that completely software based systems based on keystroke input dynamics can be as effective as expensive and cumbersome hardware based systems. Our system is behavioral based that captures the typing patterns of a user and uses that information, in addition to standard login/password security to provide a system that is user-friendly and very effective at detecting imposters.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Yan, J., Blackwell, A.F., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security and Privacy 2(5), 25–31 (2004)
Magalhães, S.T., Santos, H.D.: An improved statistical keystroke dynamics algorithm. In: Proceedings of the IADIS MCCSIS (2005)
Chen, Z.: Java Card Technology for Smart Cards. Addison Wesley, U.S.A 2000 (2000)
Ord, T., Furnell, S.M.: User authentication for keypad-based devices using keystroke analysis. In: Proceedings of the Second International Network Conference – INC 2000, Plymouth, U.K. (2000)
Gaines, R., et al.: Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF. Rand (1980)
Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)
Monrose, F., et al.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security (2001)
Monrose, F., Rubin, A.D.: Authentication via Keystroke Dynamics. In: Proceedings of the Fourth ACM Conference on Computer and Communication Security. Zurich, Switzerland (1997)
Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computing Systems (FGCS) Journal: Security on the Web (2000)
Peacock, A., Ke, X., Wilkerson, M.: Typing Patterns: A Key to User Identification. IEEE. Security and Privacy 2(5), 40–47 (2004)
Revett, K., Khan, A.: Enhancing login security using keystroke hardening and keyboard gridding. In: Proceedings of the IADIS MCCSIS 2005 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Revett, K., de Magalhães, S.T., Santos, H.M.D. (2005). Enhancing Login Security Through the Use of Keystroke Input Dynamics. In: Zhang, D., Jain, A.K. (eds) Advances in Biometrics. ICB 2006. Lecture Notes in Computer Science, vol 3832. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11608288_88
Download citation
DOI: https://doi.org/10.1007/11608288_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31111-9
Online ISBN: 978-3-540-31621-3
eBook Packages: Computer ScienceComputer Science (R0)