Abstract
Typing rhythms are one of the rawest form of data stemming from the interaction between humans and computers. When properly analyzed, they may allow to ascertain personal identity. In this paper we provide experimental evidence that the typing dynamics of free text can be used for user identification and authentication even when typing samples are written in different languages. As a consequence, we argue that keystroke analysis can be useful even when people may use different languages, in those areas where ascertaining personal identity is important or crucial, such as within Computer Security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ashbourn, J.: Biometrics: Advanced Identity Verification. The Complete Guide. Springer, London (2000)
Axelsson, S.: The Base-rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security 3(3), 186–205 (2000)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. on Information and System Security (ACM TISSEC) 5(4), 1–31 (2002)
Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Journal of Intelligent Data Analysis 7(5) (2003)
Bleha, S., Slivinsky, C., Hussein, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. on Pattern Analysis and Machine Intelligence PAMI-12(12), 1217–1222 (1990)
Brown, M.E., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. of Man-Machine Studies 39, 999–1014 (1993)
Dowland, P., Furnell, S.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. In: Proc. of of IFIP/SEC 2004 9th Int. Conf. on Information Security, Toulouse, France, Kluwer, Dordrecht (2004)
Dowland, P., Furnell, S., Papadaki, M.: Keystroke Analysis as a Method of Advanced User Authentication and Response. In: Proc. of of IFIP/SEC 2002 - 17th Int. Conf. on Information Security, Cairo, Egypt. Kluwer, Dordrecht (2002)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons, Chichester (2000)
Furnell, S., Morrissey, J., Sanders, P., Stockel, C.: Applications of keystroke analysis for improved login security and continuous user authentication. In: Proc. of the Information and System Security Conf., pp. 283–294 (1996)
Gunetti, D., Ruffo, G.: Intrusion Detection through Behavioural Data. In: Hand, D.J., Kok, J.N., R. Berthold, M. (eds.) IDA 1999. LNCS, vol. 1642, p. 383. Springer, Heidelberg (1999)
Joyce, R., Gupta, G.: User authorization based on keystroke latencies. Comm. of the ACM 33(2), 168–176 (1990)
Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. of Man-Machine Studies 28(1), 67–76 (1988)
Leggett, J., Williams, G., Usnick, M.: Dynamic identity verification via keystroke characteristics. Int. J. of Man-Machine Studies 35, 859–870 (1991)
Mansfield, A.J., Wayman, J.L.: Best Practices in Testing and Reporting Performances of Biometric Devices. Deliverable of the Biometric Working Group of the CESG Gov. Communication Headquarters of the United Kingdom. National Physical Laboratory, Report CMCS 14/02. Teddington, United Kingdom (2002), Report, available at http://www.cesg.gov.uk/technology/biometrics/media/Best%20Practice.pdf
Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proc. of the 4th ACM Computer and Communications Security Conf. ACM Press, New York (1997)
Obaidat, M.S., Sadoun, B.: A simulation evaluation study of neural network techniques to computer user identification. Information Sciences 102, 239–258 (1997)
Perkowitz, M., Etzioni, O.: Adaptive Web Sites: Conceptual Framework and Case Study. Artificial Intelligence 118(1,2), 245–275 (2000)
Wayman, J.L.: Fundamentals of Biometric Authentication Technologies. In: Proc. of CardTech/SecurTech Conference (1999), Available at http://www.engr.sjsu.edu/biometrics/nbtccw.pdf
Wayman, J.L. (ed.): National Biometric Test Center: Collected Works 1997-2000 (Biometric Consortium of the U.S. Government interest group on biometric authentication). San Jose State University, CA (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gunetti, D., Picardi, C., Ruffo, G. (2005). Keystroke Analysis of Different Languages: A Case Study. In: Famili, A.F., Kok, J.N., Peña, J.M., Siebes, A., Feelders, A. (eds) Advances in Intelligent Data Analysis VI. IDA 2005. Lecture Notes in Computer Science, vol 3646. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552253_13
Download citation
DOI: https://doi.org/10.1007/11552253_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28795-7
Online ISBN: 978-3-540-31926-9
eBook Packages: Computer ScienceComputer Science (R0)