Abstract
In this paper we show experimentally that typing dynamics of free text provide useful information for user identification and authentication even when a long time has passed since typing profiles of users were formed, and even when users are writing in a language different from the one used to form their profiles. Hence, we argue that keystroke analysis can be an effective aid in different areas where ascertaining user identity is important or crucial, including Computer Security and User Modeling.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ashbourn, J.: Biometrics: Advanced Identity Verification. The Complete Guide. Springer, London (2000)
Axelsson, S.: The Base-rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security 3(3), 186–205 (2000)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. on Information and System Security 5(4) (2002)
Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Journal of Intelligent Data Analysis 7(5) (2003)
Brown, M.E., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. of Man-Machine Studies 39, 999–1014 (1993)
Dowland, P., Furnell, S., Papadaki, M.: Keystroke Analysis as a Method of Advanced User Authentication and Response. In: Proc. of of IFIP/SEC 2002 - 17th Int. Conf. on Information Security, Cairo, Egypt (2002)
Dowland, P., Furnell, S.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. In: Proc. of IFIP/SEC 2004 - 19th Int. Conf. on Information Security, Toulouse, France. Kluwer, Dordrecht (2004)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley, Chichester (2000)
Fink, J., Kobsa, A.: A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web. User Modeling and User-Adapted Interaction 10(3-4), 209–249 (2002)
Furnell, S., Morrissey, J., Sanders, P., Stockel, C.: Applications of keystroke analysis for improved login security and continuous user authentication. In: Proc. of the Information and System Security Conf. (1996)
Gunetti, D., Ruffo, G.: Intrusion Detection through Behavioural Data. In: Proc. of the Third Symp. on Intelligent Data Analysis. LNCS. Springer, Heidelberg (1999)
Clarke, N., Furnell, S., Lines, B., Reynolds, P.: Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets. In: Proc. of the 18th IFIP/SEC 2003 Conf., Athens, Greece. Kluwer, Dordrecht (2003)
Joyce, R., Gupta, G.: User authorization based on keystroke latencies. Comm. of the ACM 33(2), 168–176 (1990)
Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. of Man-Machine Studies 28(1), 67–76 (1988)
Leggett, J., Williams, G.I., Usnick, M.: Dynamic identity verification via keystroke characteristics. Int. J. of Man-Machine Studies 35, 859–870 (1991)
Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proc. of the 4th ACM Computer and Communications Security Conf. ACM Press, New York (1997)
Obaidat, M.S., Sadoun, B.: A simulation evaluation study of neural network techniques to computer user identification. Information Sciences 102, 239–258 (1997)
Perkowitz, M., Etzioni, O.: Adaptive Web Sites: Conceptual Framework and Case Study. Artificial Intelligence 118(1,2), 245–275 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gunetti, D., Picardi, C., Ruffo, G. (2005). Dealing with Different Languages and Old Profiles in Keystroke Analysis of Free Text. In: Bandini, S., Manzoni, S. (eds) AI*IA 2005: Advances in Artificial Intelligence. AI*IA 2005. Lecture Notes in Computer Science(), vol 3673. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558590_36
Download citation
DOI: https://doi.org/10.1007/11558590_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29041-4
Online ISBN: 978-3-540-31733-3
eBook Packages: Computer ScienceComputer Science (R0)