Comparative analysis of advanced technologies for authenticating users by keystroke dynamics

Authors

  • В.А. Алексеев
  • Д.В. Маслий
  • Д.Ю. Горелов

Abstract

A comparative analysis of research results in the direction of authenticating users by keystroke dynamics over the past few decades with using common probabilistic statistical models and machine learning algorithms is given. The main criteria for the effectiveness of authentication systems based on the analysis of the keystroke dynamics features are formulated.

References

Брюхомицкий, Ю.А. Исследование биометрических систем динамической аутентификации пользователей ПК по рукописному и клавиатурному почеркам : учеб.-метод. пособие / Ю.А Брюхомицкий, М.Н. Казарин. – Таганрог, 2004.

Kyle O.Bailey, James S. Okolica, Gilbert Peterson, “User identification and authentication using multi-modal behavioral biometrics,” Computers and Security journal, vol.43, pp.77-89, June 2014.

Roman V.Yampolskiy, Venu Govindaraju. Behavioural biometrics: a survey and classification // International Journal of Biometrics, vol.1, pp.81-113, Novemberv 2008.

Gaines, R., Lisowski, W., Press, S. and Shapiro, N. Authentication by keystroke timing: some preliminary results // Technical Report Rand Rep. R-2560-NSF, RAND Corporation, p. 51, 1980.

Spillane, R. Keyboard apparatus for personal identifica-tion. IBM Technical Disclosure Bulltin, 17(11), 1975.

Sim, T. and Janakiraman, R. Are digraphs good for free-text keystroke dynamics? // IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–6, 2007.

Umphress, D., Williams, G. Identity verification through keyboard characteristics // International Journal of Man-Machine Studies, vol. 23(3), pp. 263–273, 1985.

Balagani, K.S., Vir V. Phoha, Ray, A. and Phoha, S. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication // Pattern Recognition Letters, vol. 32(7), pp. 1070–1080, 2011.

Md Liakat Ali, John Monaco, Charles Tappert, Meikang Qiu. Keystroke Biometric Systems for User Authentication // Journal of Signal Processing Systems, vol. 86(2) pp.175–190, March 2017.

How to Cite

Алексеев, В., Маслий, Д., & Горелов, Д. (2017). Comparative analysis of advanced technologies for authenticating users by keystroke dynamics. Radiotekhnika, 2(189), 195–201. Retrieved from http://rt.nure.ua/article/view/184439

Issue

Section

Articles