Skip to main content

Keyboard Usage Authentication Using Time Series Analysis

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9829))

Abstract

In this paper, we introduce a new approach to recognising typing behaviour (biometrics) from an arbitrary text in heterogeneous environments using the context of time series analytics. Our proposed method differs from previous work directed at understanding typing behaviour, which was founded on the idea of usage a feature vector representation to construct user profiles. We represent keystroke features as sequencing discrete points of events that allow dynamically detection of suspicious behaviour over the temporal domain. The significance of the approach is in the context of typing authentication within open session environments, for example, identifying users in online assessments and examinations used in eLearning environments and MOOCs, which are becoming increasingly popular. The proposed representation outperforms the established feature vector approaches with a recorded accuracy of 98 %, compared to 83 %; a significant result that clearly indicates the advantage offered by the proposed time series representation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Massive Open Online Course (MOOC): is a web-based teaching distance that allows users to participating a variety of learning resources including filmed lectures, board discussion, etc. It is widely becoming used in the academic teaching process. See https://www.mooc-list.com/.

References

  1. Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)

    Article  Google Scholar 

  2. Bixler, R., D’Mello, S.: Detecting boredom and engagement during writing with keystroke analysis, task appraisals, and stable traits. In: Proceedings of the International Conference on Intelligent User Interfaces, pp. 225–234. ACM (2013)

    Google Scholar 

  3. Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12(12), 1217–1222 (1990)

    Article  Google Scholar 

  4. Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)

    Article  Google Scholar 

  5. Choi, Y.: Keystroke patterns as prosody in digital writings: a case study with deceptive reviews and essays. In: Empirical Methods on Natural Language Processing (EMNLP) (2014)

    Google Scholar 

  6. Craswell, N.: Mean reciprocal rank. In: Liu, L., Özsu, M.T. (eds.) Encyclopedia of Database Systems, p. 1703. Springer, US (2009)

    Google Scholar 

  7. Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Security and Protection in Information Processing Systems. IFIP, vol. 147, pp. 275–289. Springer, US (2004)

    Google Scholar 

  8. de Lima e Silva Filho, S.R., Roisenberg, M.: Continuous authentication by keystroke dynamics using committee machines. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 686–687. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Stockton Gaines, R., William Lisowski, S., Press, J., Shapiro, N.: Authentication by keystroke timing: Some preliminary results. Technical report, DTIC Document (1980)

    Google Scholar 

  10. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)

    Article  MATH  Google Scholar 

  11. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  12. Messerman, A., Mustafic, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: International Joint Conference on Biometrics (IJCB), pp. 1–8. IEEE (2011)

    Google Scholar 

  13. Ogihara, A., Matsumuar, H., Shiozaki, A.: Biometric verification using keystroke motion and key press timing for atm user authentication. In: International Symposium on Intelligent Signal Processing and Communications, ISPACS 2006, pp. 223–226. IEEE (2006)

    Google Scholar 

  14. Polemi, D.: Biometric techniques: review and evaluation of biometric techniques for identification and authentication, including an appraisal of the areas where they are most applicable. Reported prepared for the European Commision DG XIIIC 4 (1997)

    Google Scholar 

  15. Rabiner, L., Juang, B.-H.: Fundamentals of speech recognition. Prentice Hall (1993)

    Google Scholar 

  16. Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, pp. 111–114. IET (1995)

    Google Scholar 

  17. Sridhar, M., Abraham, T., Rebello, J., D’souza, W., D’Souza, A.: Intrusion detection using keystroke dynamics. In: Das, V.V. (ed.) Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing. LNEE, vol. 150, pp. 137–144. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  18. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations in feature vector structure in keystroke dynamics authentication systems. Softw. Qual. J. 24(1), 137–157 (2014)

    Article  Google Scholar 

  19. Wang, X., Mueen, A., Ding, H., Trajcevski, G., Scheuermann, P., Keogh, E.: Experimental comparison of representation methods and distance measures for time series data. Data Min. Knowl. Discov. 26(2), 275–309 (2013)

    Article  MathSciNet  Google Scholar 

  20. Yampolskiy, R.V., Govindaraju, V.: Behavioural biometrics: a survey and classification. Int. J. Biom. 1(1), 81–113 (2008)

    Article  Google Scholar 

Download references

Acknowledgment

We would like to express our thanks to those who participated in collecting the data and to Laureate Online Education b.v. for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdullah Alshehri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Alshehri, A., Coenen, F., Bollegala, D. (2016). Keyboard Usage Authentication Using Time Series Analysis. In: Madria, S., Hara, T. (eds) Big Data Analytics and Knowledge Discovery. DaWaK 2016. Lecture Notes in Computer Science(), vol 9829. Springer, Cham. https://doi.org/10.1007/978-3-319-43946-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43946-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-43945-7

  • Online ISBN: 978-3-319-43946-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics