Skip to main content

Keystroke Analysis of Different Languages: A Case Study

  • Conference paper
Advances in Intelligent Data Analysis VI (IDA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3646))

Included in the following conference series:

Abstract

Typing rhythms are one of the rawest form of data stemming from the interaction between humans and computers. When properly analyzed, they may allow to ascertain personal identity. In this paper we provide experimental evidence that the typing dynamics of free text can be used for user identification and authentication even when typing samples are written in different languages. As a consequence, we argue that keystroke analysis can be useful even when people may use different languages, in those areas where ascertaining personal identity is important or crucial, such as within Computer Security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashbourn, J.: Biometrics: Advanced Identity Verification. The Complete Guide. Springer, London (2000)

    Google Scholar 

  2. Axelsson, S.: The Base-rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security 3(3), 186–205 (2000)

    Article  MathSciNet  Google Scholar 

  3. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. on Information and System Security (ACM TISSEC) 5(4), 1–31 (2002)

    Google Scholar 

  4. Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Journal of Intelligent Data Analysis 7(5) (2003)

    Google Scholar 

  5. Bleha, S., Slivinsky, C., Hussein, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. on Pattern Analysis and Machine Intelligence PAMI-12(12), 1217–1222 (1990)

    Article  Google Scholar 

  6. Brown, M.E., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. of Man-Machine Studies 39, 999–1014 (1993)

    Article  Google Scholar 

  7. Dowland, P., Furnell, S.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. In: Proc. of of IFIP/SEC 2004 9th Int. Conf. on Information Security, Toulouse, France, Kluwer, Dordrecht (2004)

    Google Scholar 

  8. Dowland, P., Furnell, S., Papadaki, M.: Keystroke Analysis as a Method of Advanced User Authentication and Response. In: Proc. of of IFIP/SEC 2002 - 17th Int. Conf. on Information Security, Cairo, Egypt. Kluwer, Dordrecht (2002)

    Google Scholar 

  9. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons, Chichester (2000)

    Google Scholar 

  10. Furnell, S., Morrissey, J., Sanders, P., Stockel, C.: Applications of keystroke analysis for improved login security and continuous user authentication. In: Proc. of the Information and System Security Conf., pp. 283–294 (1996)

    Google Scholar 

  11. Gunetti, D., Ruffo, G.: Intrusion Detection through Behavioural Data. In: Hand, D.J., Kok, J.N., R. Berthold, M. (eds.) IDA 1999. LNCS, vol. 1642, p. 383. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  12. Joyce, R., Gupta, G.: User authorization based on keystroke latencies. Comm. of the ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  13. Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. of Man-Machine Studies 28(1), 67–76 (1988)

    Article  Google Scholar 

  14. Leggett, J., Williams, G., Usnick, M.: Dynamic identity verification via keystroke characteristics. Int. J. of Man-Machine Studies 35, 859–870 (1991)

    Article  Google Scholar 

  15. Mansfield, A.J., Wayman, J.L.: Best Practices in Testing and Reporting Performances of Biometric Devices. Deliverable of the Biometric Working Group of the CESG Gov. Communication Headquarters of the United Kingdom. National Physical Laboratory, Report CMCS 14/02. Teddington, United Kingdom (2002), Report, available at http://www.cesg.gov.uk/technology/biometrics/media/Best%20Practice.pdf

  16. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proc. of the 4th ACM Computer and Communications Security Conf. ACM Press, New York (1997)

    Google Scholar 

  17. Obaidat, M.S., Sadoun, B.: A simulation evaluation study of neural network techniques to computer user identification. Information Sciences 102, 239–258 (1997)

    Article  Google Scholar 

  18. Perkowitz, M., Etzioni, O.: Adaptive Web Sites: Conceptual Framework and Case Study. Artificial Intelligence 118(1,2), 245–275 (2000)

    Article  MATH  Google Scholar 

  19. Wayman, J.L.: Fundamentals of Biometric Authentication Technologies. In: Proc. of CardTech/SecurTech Conference (1999), Available at http://www.engr.sjsu.edu/biometrics/nbtccw.pdf

  20. Wayman, J.L. (ed.): National Biometric Test Center: Collected Works 1997-2000 (Biometric Consortium of the U.S. Government interest group on biometric authentication). San Jose State University, CA (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gunetti, D., Picardi, C., Ruffo, G. (2005). Keystroke Analysis of Different Languages: A Case Study. In: Famili, A.F., Kok, J.N., Peña, J.M., Siebes, A., Feelders, A. (eds) Advances in Intelligent Data Analysis VI. IDA 2005. Lecture Notes in Computer Science, vol 3646. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552253_13

Download citation

  • DOI: https://doi.org/10.1007/11552253_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28795-7

  • Online ISBN: 978-3-540-31926-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics