Keystroke active authentications based on most frequently used words

Alaa Darabseh, Akbar Siami Namin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The aim of this research is to advance the user active authentication technology using keystroke dynamics. Through this research, we assess the performance and influence of various keystroke features on keystroke dynamics authentication systems. In particular, we investigate the performance of keystroke features on a subset of most frequently used English words. The performance of four features including key duration, flight time latency, diagraph time latency, and word total time duration are analyzed. Experiments are performed to measure the performance of each feature individually and the results from the different subsets of these features. The results of the experiments are evaluated using 28 users. The experimental results show that diagraph time offers the best performance result among all four keystroke features, followed by flight time. Furthermore, the paper introduces new feature which can be effectively used in the keystroke dynamics domain

Original languageEnglish
Title of host publicationIWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015
PublisherAssociation for Computing Machinery, Inc
Pages49-54
Number of pages6
ISBN (Electronic)9781450333412
DOIs
StatePublished - Mar 4 2015
Event2015 ACM International Workshop on Security and Privacy Analytics, IWSPA 2015 - San Antonio, United States
Duration: Mar 4 2015 → …

Publication series

NameIWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015

Conference

Conference2015 ACM International Workshop on Security and Privacy Analytics, IWSPA 2015
CountryUnited States
CitySan Antonio
Period03/4/15 → …

Keywords

  • Authentication
  • Biometrics
  • Keystroke dynamics
  • Keystroke feature
  • Security

Fingerprint Dive into the research topics of 'Keystroke active authentications based on most frequently used words'. Together they form a unique fingerprint.

  • Cite this

    Darabseh, A., & Namin, A. S. (2015). Keystroke active authentications based on most frequently used words. In IWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015 (pp. 49-54). (IWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015). Association for Computing Machinery, Inc. https://doi.org/10.1145/2713579.2713589