Professional Documents
Culture Documents
ABSTRACT
In todays scenario there is a major threat to misuse the
personal as well as official data. Data which is easily
accessible from the storage device by an
unauthenticated user is a major concern and needs to be
eradicated. Increase in number of software and devices
for hacking and cracking causes gains in unauthorized
access which results in exploitation of important data.
Methods like user ID and password which is mostly
used as security is now not reliable and secure due to
rapidly increase in hackers and crackers. Also this
method no longer provides consistent safety measures
because passwords are prone to shoulder surfing and
passwords can also be hacked. To gain secure and
efficient access either user must change his password
frequently or the user should use strong password
(combination of alphabets, numeric and special
symbols). Users do not respect these conditions as they
feel them quite strict and difficult to be applied. The
solution to above said problems is keystroke dynamics.
Keystroke Dynamics is a behavioral biometric approach
to enhance the computer access rights. It verifies the
individual by its keystroke typing pattern. Keystroke
biometric is based on the assumption that the typing
pattern of each user is unique. The objective of this
review paper is to summarize the well-known
approaches used in keystroke dynamics.
Keywords: Authentication, Keystroke Dynamics, Dwell
time, Flight time.
I.
INTRODUCTION
www.ijsret.org
378
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 4, April 2015
Flight time
Dwell time
A
www.ijsret.org
379
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 4, April 2015
II.
REVIEW OF EXISTING
LITERATURE
www.ijsret.org
380
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 4, April 2015
www.ijsret.org
381
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 4, April 2015
Appro
ach
taken
Text
Entry
www.ijsret.org
Types or
categories of
approach
considered
Static text or
Structured text
and Dynamic
text or free text
Description
382
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 4, April 2015
Featur
es
Error
Metric
s
classifi
cation
algorit
hm
False
Accept
Rate&
False
Reject Rte
Statisti
cal
Algori
thm
Neural
Netwo
rk
Pattern
Recog
nition
algorit
hm
ACKNOWLEDGMENT
REFERENCES
I.
Books
HAN, KAMBER AND PEI (2012), DATA MINING:
CONCEPTS AND TECHNIQUES, ELSEVIER.
II.
Research Papers
[1] N. Chourasia (2014), AUTHENTICATION OF
THE USER BY KEYSTROKE DYNAMICS FOR
BANKING TRANSACTION SYSTEM, pp. 41
45, 2014.
[2] A. K. Hussain and M. M. Alnabhan (2014),
Advanced Authentication Scheme Using a
Predefined Keystroke Structure, Int. J. Comput.
Sci. Inf. Technol., vol. 6, no. 2, pp. 163169.
[3] K. Senathipathi (2014), An Analysis of Particle
Swarm Optimization and Genetic Algorithm with
Respect to Keystroke Dynamics, Green Computing
Communication and Electrical Engineering
(ICGCCEE), Coimbatore, pp. 1 11.
[4] T. Maheswari and S. Anitha (2014), User
Authentication
Based on
Biometrics
for
Convincing User in keystroke dynamics, ISR
NATIONAL Journal of Advanced Research in
Computer Science Engineering and Information
Technology, Volume: 1 Issue: 1 08-May-2014, pp.
6370.
[5] D. Rudrapal, S. Das, and S. Debbarma (2014),
Improvisation of Biometrics Authentication, 10th
International
Conference,
ICDCIT
2014,
Bhubaneswar, India, pp. 287292.
[6] A. Ahmed and I. Traore (2014), Biometric
Recognition Based on Free-Text Keystroke
Dynamics,
IEEE
TRANSACTIONS
ON
CYBERNETICS, vol. 44, no. 4, pp. 458472.
[7] J. V. Monaco, N. Bakelman, S.-H. Cha, and C. C.
Tappert (2013), Recent Advances in the
Development of a Long-Text-Input Keystroke
Biometric Authentication System for Arbitrary Text
Input, Eur. Intell. Secur. Informatics Conf., pp. 60
66.
[8] K. Singh (2013), Rule Based Approach for
Keystroke Biometrics to identify authenticated
user, (IJCSIS) International Journal of Computer
Science and Information Security, vol. 11, no. 7, pp.
614.
[9] S. Bajaj and S. Kaur (2013), Typing Speed
Analysis of Human for Password Protection (Based
www.ijsret.org
383
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 4, April 2015
www.ijsret.org
384