
The experiments suggest that keystroke biometric devices can be developed for the
Internet using the average normalization technique to separate the typing samples
from the computer platform used to generate them. These keystroke biometric devices
can use open-platform tools like Java Applets or CGI programs. Multi-thread Java
programming techniques can already be used to capture the user typing rhythm with-
out intrusive impact i.e. not using ‘heavy’ components as e.g. ActiveX which need
special security permissions in order to access to low-level features of the machine.
Nowadays, the systems alerts to the user in order to close other applications running
during the login process in the website because the program could get varying
amounts of processor time, due the counts depend heavily on the other processes on
the machine. Future work could be focused on solving this issue.
The presented system is good for the B2C e-commerce model where we want to
reach a broad market i.e. it is good because it is a way to increase the security related
to the authentication process without requiring special biometric hardware devices
like fingerprint readers and so. The prototypes developed in our work have a low cost
in hardware and software in comparison to other traditional biometric devices (fin-
gerprint, iris-scan, etc.) and ‘brute force’ attacks are useless against them because
they should generate also the interkey/holdkey times in each password typing
(sample).
References
1. Bolle,R., Jain,A., Pankanti,S. Biometrics. Personal Identification in Networked Society.
Kluwer Academic Publishers. (1999)
2. Gaines,R., Lisowski,W., Press,S., Shapiro,N. Authentication by keystroke timing: some
preliminary results. In Rand Report, R-256, NSF, Rand Corp., Santa Monica, CA. (1980)
3. Monrose,F., Rubin,A.D., Keystroke dynamics as a biometric for authentication. Elsevier
Science Direct, 16, (no.4):351-359. (2000)
4. Obaidat,M.S., Sadoun,B. Verification of computer users using keystroke dynamics. IEEE
Trans. on Systems, Man and Cybernetics. Vol.27, No.2, 261-269. (1997)
5. Tapiador,M., Sigüenza,J. Fuzzy Keystroke Biometrics on web security. In AutoID’99
Proceedings: workshop on Automated Identification Advances Technologies, Summit,
New Jersey, USA, October 1999, IEEE Robotics and Automation Society, 133-136.
(1999)
6. Wayman, J.L. Technical Testing and Evaluation of Biometric Identification Devices. In
Biometrics. Personal Identification in Networked Society. 345-368. Kluwer Academic
Publishers. (1999)
78