WEB SECURITY ENHANCEMENT BASED ON KEYSTROKE DYNAMICS

Michał Choraś, Piotr Mroczkowski

2007

Abstract

Many online access systems (e.g. e-banking) require stronger protection than the login-id password pair can provide. Other, more sophisticated techniques of identity verification are in demand: one-time passwords, smart cards or biometric technologies. Among several biometric approaches the web-based solution that incorporates keystroke dynamics is the most relevant due to the low cost of the implementation, satisfactory results as well as the degree of transparency it offers.

References

  1. F. Monrose, A. Rubin, ”Keystroke Dynamics as a Biometric for Authentication”, Future Generation Computer Systems, vol. 16 , no. 4, 351 - 359, 2000.
  2. G. Leggett, J. Williams, M. Usnick, ”Dynamic Identity Verification via Keystroke Characteristics”, International Journal of Man-Machine Studies, vol. 35 , no. 6, 859 - 870, 1991.
  3. R. Gaines, W. Lisowski, S. Press, N. Shapiro, ”Authentication by Keystroke Timing: some preliminary results”, Rand Report R-256-NSF. Rand Corporation, 1980.
  4. F. Monrose, A. Rubin, ”Authentication via Keystroke Dynamics”, Conference on Computer and Communications Security , 48-56, 1997.
  5. R. Joyce, G. Gupta, ”User authorization based on keystroke latencies”, Communications of ACM, vol. 33, no. 2, 168-176, 1990.
  6. S. Bleha, C. Slivinsky, B. Hussein, ”Computer-access security systems using keystroke dynamics”, IEEE Trans. on Patt. Anal. Mach. Int, vol. 12, no. 12, 1217-1222, 1990.
  7. M. Brown, S. J. Rogers, ”User identification via keystroke characteristics of typed names using neural networks”, International Journal of Man-Machine Studies, no. 39, 999-1014, 1993.
  8. F. Bergadano, D. Gunetti, C. Picardi, ”User Authentication through Keystroke Dynamics”, ACM Transactions on Information and System Security, vol.5, no. 4, 367 - 397, 2002.
  9. M. Brown, S. J. Rogers, ”Method and apparatus for verification of a computer user's identification, based on keystroke characteristics”, Patent Number 5,557,686, U.S. Patent and Trademark Office, Washington, D.C., 1996.
  10. E. Yu, S. Cho, ”Biometrics-based Password Identity Verification: Some Practical Issues and Solutions,” XVth Triennial Congress of the International Ergonomics Association (IEA), Aug 24-29, Seoul, Korea, 2003.
  11. P. Mroczkowski, M. Choras, ”Keystroke Dynamics in Biometrics Client-Server Password Hardening System”, Proc. of Advanced Computer Systems (ACS), vol. II, 75-82, Miedzyzdroje, Poland, October 2006.
Download


Paper Citation


in Harvard Style

Choraś M. and Mroczkowski P. (2007). WEB SECURITY ENHANCEMENT BASED ON KEYSTROKE DYNAMICS . In Proceedings of the Third International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-972-8865-77-1, pages 337-340. DOI: 10.5220/0001264903370340


in Bibtex Style

@conference{webist07,
author={Michał Choraś and Piotr Mroczkowski},
title={WEB SECURITY ENHANCEMENT BASED ON KEYSTROKE DYNAMICS},
booktitle={Proceedings of the Third International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2007},
pages={337-340},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001264903370340},
isbn={978-972-8865-77-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Third International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - WEB SECURITY ENHANCEMENT BASED ON KEYSTROKE DYNAMICS
SN - 978-972-8865-77-1
AU - Choraś M.
AU - Mroczkowski P.
PY - 2007
SP - 337
EP - 340
DO - 10.5220/0001264903370340