A Study And Analysis of Keystroke Dynamics And Its Enhancement For Proficient
User Authentication.
Dwijen Rudrapal, Smita Das
Dept. of Computer Sc. & Engineering
National Institute of Technology, Agartala
Jirania, Tripura (W). India
dwijen_m@rediffmail.com
Ashim Saha, Lalita Kumari, N.Debbarma
Dept. of Computer Sc. & Engineering
National Institute of Technology, Agartala
Jirania, Tripura (W). India
smitadas.nita@gmail.com
Abstract—in this paper we proposed one new measure of
keystroke patterns over and above of the existing features for
making user authentication through keystroke more efficient.
With comparison to other access control systems based on
biometric features, keystroke analysis has not yet meets
acceptable level of accuracy. The reason is probably the
intrinsic variability of typing dynamics, versus other very
stable biometric characteristics, such as face or fingerprint.
Our experiment and statistical analysis described in the
current literature and show through experimental data that,
the proposed unique measure of keystrokes can be combined
with existing authentication mechanism to improve the
authentication and security of delicate applications to a very
high extent. It can be useful to ascertain the intruders and
reject them from the system, provided that we are able to deal
with the typing rhythm of the intruders. Our methodology can
rely on what is typed by people because of their normal job.
We also argue that our proposed new measure of keystroke
with combination of other keystroke patterns can be used as a
complementary way of user authentication and as an aid to
intrusion detection to improve security.
Keyword: keystroke analysis; degree of disorder; biometrics
authentication; digraph; trigraph;
I. INTRODUCTION
The omnipresent computer systems in our civilization
now a day have become the strong resource of an
exponentially increasing collection of information. A
significant portion of this information is often worthy,
sensitive and should only be accessed by authorized
individuals. To provide sufficient confidentiality and
integrity in data and information, different identification
techniques are used to authenticate users; typically, and
historically, through username and password schemes. One
user is given one username and one password. Traditionally
the username has been used as the user identification
credential [1]. Privileges in the system (such as access to
files and services) are defined for each username (or user
group). The username usually remains open to everyone. To
authenticate a user the password is kept secret. The trust
relationship between a user and a system is based on the
selecting the appropriate username, assuming that the
password is secret. Keystroke dynamics [2] has often been
suggested as a method to harden traditional authentication
system. Keystroke dynamics does not need extra hardware
and features can be extracted in back side of the application.
So, this has been shown to be a feasible biometric system.
Through this paper we reviewed previous work done on
keystroke dynamics, examine the existence of global typing
patterns and identify one more feature analysis method that
would make keystroke authentication system stronger.
II. CURRENT AUTHENTICATION SCENARIO
Current authentication solutions have been
conventionally categorized into the three factors of
something the user has (usb token, mobile phone), something
the user knows (password, social security number), and
something the user is (biometrics). The most widely
implemented of these three has been password authentication
systems. Password systems benefit from low implementation
costs and effectiveness in terms of accuracy (a password is
either correct or wrong). However, there are a number of
effective methods available for attacking passwords and thus
passwords are plagued by several inadequacies. None of the
three factors are unblemished and this has led to the adoption
of two-factor authentication (multi factor authentication)
systems where security is a top priority. Some of the country
like USA has already recognized the weakness of single-
factor authentication and recommends that banks should
adopt some form of multi-factor authentication. Of the three
factors, biometrics offers the most promise in authentication,
yet has been slow in its adoption. That is only because of
costs associated and the lack of standardization.
III. MOTIVATION
Passwords are plagued by several inadequacies.
Authentication based on conventional password policies
flash several issues like on security and user convenience.
Attacker or hacker can guess password and gain
unauthorized access and claim as a true user. Besides these
an attacker can use multiple techniques to gain multiple
passwords like
• Encrypting a password is a feature used to prevent
network password sniffing, where malicious users
take use of tools to look at packet content in hope of
finding passwords in clear text sent between host
and authenticator.
• Even encrypted passwords are exploited by attackers
using password cracking techniques, such as
482
978-1-4673-1850-1/12/$31.00 © 2012 IEEE
2012 4th International Conference on Electronics Computer Technology (ICECT 2012)