Seminar On -

Keystroke Dynamics
Contents
• Introduction
 Overview of Biometrics
 Characteristics
• Various approaches of research on keystroke dynamics
...
User Authentication Approaches
What is Biometric Authentication?
• An automatic method that identifies user or verifies the
identity of living individual...
Physiological characteristics
• Biological/chemical based –
 Finger prints
 Iris, Retinal scanning
 Hand shape geometry...
Behavioral characteristics
• A reflection of an individual’s psychology
Hand written signatures
Voice pattern
Mouse mov...
Keystroke Dynamics

• Keystroke dynamics, or typing dynamics, is the detailed
timing information that describes exactly wh...
Keystroke Verification Techniques
• Static verification (Fixed text mode)
 Only based on password typing rhythm
 Authent...
Some metrics for user verification
•
•
•
•
•
•
•
•
•

Typing speed
Keystroke seek-time
Flight time
Characteristic sequence...
Keystroke analysis
• Variety of methods
Mean typing rate(wpm)
Inter-interval comparison
Digraph
Trigraph
Biometric System
Advantages :
• Software Only method. (No Additional Hardware
except a Keyboard)
• Simple To Deploy and Use (username &
pas...
Drawbacks:
• User’s susceptibility to fatigue
• Dynamic change in typing patterns

• Injury, skill of the user
• Change of...
Applications:
• There are several home software and commercial software
products which claim to use keystroke dynamics to
...
Further Research Available
• Researchers said that it will carry out more investigation on
the continuous authentication p...
Conclusions
•

It seems promising , still needs more efforts specially for
identification
 Iris scanners provide the lowe...
References
• [1] IEEE Keystroke dynamics as a biometric for
authentication, Fabian Monrose, Aviel D. Rubin, March 1999.
• ...
Keystroke dynamics
Keystroke dynamics
Upcoming SlideShare
Loading in...5
×

Keystroke dynamics

1,296

Published on

Keystroke dynamics, or typing dynamics, is the detailed timing information that describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard.

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,296
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
99
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Keystroke dynamics

  1. 1. Seminar On - Keystroke Dynamics
  2. 2. Contents • Introduction  Overview of Biometrics  Characteristics • Various approaches of research on keystroke dynamics  Techniques  Analysis • Advantages/Drawbacks of keystroke dynamics • Research Available • Conclusion
  3. 3. User Authentication Approaches
  4. 4. What is Biometric Authentication? • An automatic method that identifies user or verifies the identity of living individuals. • Types of Biometric  Physiological (Physical )  Behavioural (Behavioural )
  5. 5. Physiological characteristics • Biological/chemical based –  Finger prints  Iris, Retinal scanning  Hand shape geometry  blood vessel/vein pattern  Facial recognition  ear image  DNA
  6. 6. Behavioral characteristics • A reflection of an individual’s psychology Hand written signatures Voice pattern Mouse movement dynamics Gait (way of walking) Keystroke dynamics
  7. 7. Keystroke Dynamics • Keystroke dynamics, or typing dynamics, is the detailed timing information that describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard. • The recorded keystroke timing data is then processed through a unique neural algorithm, which determines a primary pattern for future comparison
  8. 8. Keystroke Verification Techniques • Static verification (Fixed text mode)  Only based on password typing rhythm  Authentication only at login time • Dynamic verification (free text mode)  pattern regardless of the typed text  A continuous or periodic monitoring (On-the-fly user authentication)
  9. 9. Some metrics for user verification • • • • • • • • • Typing speed Keystroke seek-time Flight time Characteristic sequences of keystrokes Examination of characteristic errors Frequency of error Method of error correction Pressure (Force of keystrokes) Duration of a specific keystroke.
  10. 10. Keystroke analysis • Variety of methods Mean typing rate(wpm) Inter-interval comparison Digraph Trigraph
  11. 11. Biometric System
  12. 12. Advantages : • Software Only method. (No Additional Hardware except a Keyboard) • Simple To Deploy and Use (username & passwords) – Universally accepted • Cost Effective • No End-User Training • It provides a simple natural way for increased computer security • Can be used over the internet
  13. 13. Drawbacks: • User’s susceptibility to fatigue • Dynamic change in typing patterns • Injury, skill of the user • Change of keyboard hardware.
  14. 14. Applications: • There are several home software and commercial software products which claim to use keystroke dynamics to authenticate a user :  BioTracker -is a biometric authentication software that uses continuous authentication to verify the identity of a user.  AdmitOneSecurity - formerly Bio Password is a patented commercial system which uses keystroke dynamics.  bioCheck- has a patented implementation which uses keystroke dynamics for ubiquitous web-based login as well as workstation authentication.
  15. 15. Further Research Available • Researchers said that it will carry out more investigation on the continuous authentication problem in our future work. • From last few years researchers are also working on the typing rhythm of an individuals. • Working for the design of more robust authentication systems.
  16. 16. Conclusions • It seems promising , still needs more efforts specially for identification  Iris scanners provide the lowest total error rate - on the order of 10-6 in many cases  Even fingerprints provide an less error rate. • As security mechanism is not visible, un authorized users cant have idea of security measure. • It is quickly emerging, low cost, non intrusive alternative • To traditional biometric technology.
  17. 17. References • [1] IEEE Keystroke dynamics as a biometric for authentication, Fabian Monrose, Aviel D. Rubin, March 1999. • [2] IEEE, Keystroke-Dynamics Authentication Against Synthetic Forgeries Deian Stefan • [3] Zeljka Zorz [Online] Avaliable: http://www.netsecurity.org/article.php?id=1610 • [4] wikipedia[Online] Avaliable : http://en.wikipedia.org/wiki/Keystroke_dynamics
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×