Table 4: FAR results for digraphs and trigraphs for the 0.4
threshold.
user Digraph FAR Trigraph FAR
user1 19.2308 50.0000
user2 46.1538 69.2308
user6 12.2807 71.9298
user8 15.2542 11.8644
user9 18.7500 81.2500
user10 26.9231 36.5385
user14 33.3333 67.9012
user15 0.0000 63.6364
user17 0.0000 10.0000
user18 54.5455 63.6364
Table 5: FAR results for typing paths and combined meth-
ods.
user Typing Path FAR Combined FAR
user1 0.0000 1.9230
user2 7.6923 0.0000
user6 0.0000 0.0000
user8 3.3898 0.0000
user9 0.0000 0.0000
user10 1.9231 0.0000
user14 0.0000 8.1649
user15 9.0909 0.0000
user17 0.0000 0.0000
user18 0.0000 0.0000
password hardening in e-banking (the combined val-
ues of F AR were equal to %0 for all but 2 users
(Table 5).This means that the presented methods are
effective and could be implemented to increase web
security in applications where logging-in is the neces-
sity for the clients.
It is hard to determine which of the developed and
implemented method gives the best performance for
all users. The best solution is to make the logon al-
gorithm adaptive. The algorithm should check which
method gives the best performance for given user in
order to give it the biggest weight while taking the
access/no access decision. In case of non-adaptive
implementation the best results were observed for
thresholds: 0,25 for trigraphs and 0,3 for digraphs.
The threshold for digraphs and trigraphs should not
be equal. It should be higher for digraphs and lower
for trigraphs. It is also noticeable that longer char
sets (trigraphs) have more stable statistics for a le-
gitimate user (the standard deviation of particular tri-
graph’s durations is small, and thus the distance cal-
culated from the degree of disorder is smaller), but on
the other hand they are easier to forge.
Keystroke dynamics are sensitive to the emotional
and physical state of the person who is verified. Very
poor typing skills are another factor which can af-
fect the process of authentication. The good thing
is that this method is very likely to achieve a high
level of acceptance among ordinary users. Moreover,
unlike other biometric systems which usually require
additional hardware and thus are expensive to imple-
ment, biometrics based on keystroke dynamics is al-
most for free - the only hardware required is the key-
board (Monrose and Rubin, 2000).
REFERENCES
F. Monrose, A. Rubin, ”Keystroke Dynamics as a Biomet-
ric for Authentication”, Future Generation Computer
Systems, vol. 16 , no. 4, 351 - 359, 2000.
G. Leggett, J. Williams, M. Usnick, ”Dynamic Identity Ver-
ification via Keystroke Characteristics”, International
Journal of Man-Machine Studies, vol. 35 , no. 6, 859
- 870, 1991.
R. Gaines, W. Lisowski, S. Press, N. Shapiro, ”Authentica-
tion by Keystroke Timing: some preliminary results”,
Rand Report R-256-NSF. Rand Corporation, 1980.
F. Monrose, A. Rubin, ”Authentication via Keystroke Dy-
namics”, Conference on Computer and Communica-
tions Security , 48-56, 1997.
R. Joyce, G. Gupta, ”User authorization based on keystroke
latencies”, Communications of ACM, vol. 33, no. 2,
168-176, 1990.
S. Bleha, C. Slivinsky, B. Hussein, ”Computer-access secu-
rity systems using keystroke dynamics”, IEEE Trans.
on Patt. Anal. Mach. Int, vol. 12, no. 12, 1217–1222,
1990.
M. Brown, S. J. Rogers, ”User identification via keystroke
characteristics of typed names using neural networks”,
International Journal of Man-Machine Studies, no. 39,
999-1014, 1993.
F. Bergadano, D. Gunetti, C. Picardi, ”User Authentication
through Keystroke Dynamics”, ACM Transactions on
Information and System Security, vol.5, no. 4, 367 -
397, 2002.
M. Brown, S. J. Rogers, ”Method and apparatus for veri-
fication of a computer user’s identification, based on
keystroke characteristics”, Patent Number 5,557,686,
U.S. Patent and Trademark Office, Washington, D.C.,
1996.
E. Yu, S. Cho, ”Biometrics-based Password Identity Verifi-
cation: Some Practical Issues and Solutions,” XVth
Triennial Congress of the International Ergonomics
Association (IEA), Aug 24-29, Seoul, Korea, 2003.
P. Mroczkowski, M. Chora
´
s, ”Keystroke Dynamics in Bio-
metrics Client-Server Password Hardening System”,
Proc. of Advanced Computer Systems (ACS), vol. II,
75-82, Miedzyzdroje, Poland, October 2006.
WEBIST 2007 - International Conference on Web Information Systems and Technologies
340