4.3 Masquerade Method
Another approach is to replace the real flight time for
particular digraph XY by a random δ
XY
chosen ran-
domly from some distribution defined for XY. Such
approach not only hides real timings of the user but
also can pretend other individual. Similarly, this ap-
proach can be extended to n-graphs. The method of-
fers moderate delay and requires relatively long size
of the buffer.The main disadvantage is the need of
keeping distribution of the digraphs, which is quite
difficult as shown in Section 3.
5 CONCLUSIONS
In this paper we discussed several issues related to
keystroking biometric techniques. We pointed out
some potential risks with particular focus on privacy
threat as well as some simple countermeasures. We
believethat issues related to this area are generally un-
derestimated. In effect many fundamental questions –
theoretical as well as practical are left unanswered. In
particular there is no convincing and possibly exact
statistical model of timings of n-graphs. It is also not
clear which other information (e.g., mistakes in typ-
ing ) can be used for recognizing individuals.
We also see the need of providing much more ex-
perimental results about statistics that appear in our
paper. The volume of data we used allows us to test
only a few simple hypothesis e.g., about normality of
distribution of digraphs. With this respect, this pa-
per is a preliminary work revealing only a fraction of
problems in the area of profiling based on keystroke
dynamics.
REFERENCES
Bergadano, F., Gunetti, D., and Picardi, C. (2002). User au-
thentication through keystroke dynamics. ACM Trans.
Inf. Syst. Secur., 5(4):367–397.
BioPassword Inc. (2007). Authentication Solutions
Through Keystroke Dynamics. Technical report.
Cho, S. and Hwang, S. (2006). Artificial rhythms and
cues for keystroke dynamics based authentication. In
(Zhang and Jain, 2006), pages 626–632.
Chudá, D. and Durfina, M. (2009). Multifactor authentica-
tion based on keystroke dynamics. In Rachev, B. and
Smrikarov, A., editors, CompSysTech, page 89. ACM.
Gaines, R. S., Lisowski, W., Press, S. J., and Shapiro, N.
(1980). Authentication by keystroke timing: Some
preliminary results. Technical report, RAND Corpo-
ration.
Joyce, R. and Gupta, G. K. (1990). Identity authentica-
tion based on keystroke latencies. Commun. ACM,
33(2):168–176.
Lilliefors, H. W. (1967). On the kolmogorov-smirnov
test for normality with mean and variance un-
known. Journal of the American Statistical Associ-
ation, 62(318):399–402.
Monrose, F. and Rubin, A. D. (1997). Authentication via
keystroke dynamics. In Graveman, R., Janson, P. A.,
Neumann, C., and Gong, L., editors, ACM Conference
on Computer and Communications Security, pages
48–56. ACM.
Revett, K. (2009). A bioinformatics based approach to user
authentication via keystroke dynamics. International
Journal Of Control Automation And Systems, 7(1):7–
15.
Revett, K., Gorunescu, F., Gorunescu, M., Ene, M., de Mag-
alhães, S., and Santos, H. (2007). A machine learning
approach to keystroke dynamics based user authenti-
cation. J. Electronic Security and Digital Forensics,
1(1):55–70.
Serjantov, A. and Newman, R. E. (2003). On the anonymity
of timed pool mixes. In Gritzalis, D., di Vimercati, S.
D. C., Samarati, P., and Katsikas, S. K., editors, SEC,
volume 250 of IFIP Conference Proceedings, pages
427–434. Kluwer.
Shapiro, S. S. and Wilk, M. B. (1965). An analysis
of variance test for normality (complete samples).
Biometrika, 52(3/4):591–611.
Sheng, Y., Phoha, V. V., and Rovnyak, S. M. (2005). A par-
allel decision tree-based method for user authentica-
tion based on keystroke patterns. IEEE Transactions
on Systems, Man, and Cybernetics, Part B, 35(4):826–
833.
Sim, T. and Janakiraman, R. (2007). Are digraphs good
for free-text keystroke dynamics? In CVPR. IEEE
Computer Society.
Song, D. X., Wagner, D., and Tian, X. (2001). Timing anal-
ysis of keystrokes and timing attacks on ssh. In Pro-
ceedings of the 10th conference on USENIX Security
Symposium - Volume 10, pages 25–25, Berkeley, CA,
USA. USENIX Association.
Stefan, D., Shu, X., and Yao, D. D. (2012). Robustness
of keystroke-dynamics based biometrics against syn-
thetic forgeries. Computers & Security, 31(1):109–
121.
Zhang, D. and Jain, A. K., editors (2006). Advances in Bio-
metrics, International Conference, ICB 2006, Hong
Kong, China, January 5-7, 2006, Proceedings, vol-
ume 3832 of Lecture Notes in Computer Science.
Springer.
Zhang, K. and Wang, X. (2009). Peeping tom in the neigh-
borhood: Keystroke eavesdropping on multi-user sys-
tems. In USENIX Security Symposium, pages 17–32.
USENIX Association.
Zhang, S., Janakiraman, R., Sim, T., and Kumar, S. (2006).
Continuous verification using multimodal biometrics.
In (Zhang and Jain, 2006), pages 562–570.
SomeRemarksonKeystrokeDynamics-GlobalSurveillance,RetrievingInformationandSimpleCountermeasures
301