Computer user verification using login string keystroke dynamics

  • Authors:
  • J. A. Robinson;V. W. Liang;J. A.M. Chambers;C. L. MacKenzie

  • Affiliations:
  • Fac. of Eng. & Appl. Sci., Memorial Univ. of Newfoundland, St. John's, Nfld.;-;-;-

  • Venue:
  • IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
  • Year:
  • 1998

Quantified Score

Hi-index 0.00

Visualization

Abstract

The keystroke dynamics of a computer user's login string provide a characteristic pattern that can be used for identity verification. Timing vectors for several hundred login attempts were collected for ten “valid” users and ten “forgers”, and classification analysis was applied to discriminate between them. Three different classifiers were applied, and in each case the key hold times were more effective features for discrimination than the interkey times. Best performance was achieved by an inductive learning classifier using both interkey and hold times. A high rate of typographical errors during login entry is reported. In practice, these are usually corrected errors-that is, they are strings which include backspaces to correct earlier errors-but their presence confounds the use of typing-style analysis as a practical means of securing access to computer systems