Evaluation Scheme to Analyze Keystroke Dynamics Methods (2407.16247v1)
Abstract: Password authentication is a weak point for security as passwords are easily stolen and a user may ignore the security by using a simple password. Therefore, services increasingly demand a second factor. While this may enhance security, it comes with a lower level of usability and another factor to be forgotten. A smartphone is an important device in daily life. With the growing number of sensors and features in a smartphone, keystroke dynamics may provide an easy-to-use method. In this paper, we introduce requirements for biometric authentication and keystroke dynamics. This results in an evaluation scheme, which is applied to three selected approaches. Based on the comparison, keystroke dynamics and the evaluation scheme are discussed. The obtained results indicate that keystroke dynamics can be used as another authentication method but can be bypassed by stronger adversaries. For further research, a common data set would improve the comparability.
- Statistical Keystroke Dynamics System on Mobile Devices for Experimental Data Collection and User Authentication. In Proceedings of the 9th International IEEE Conference on Developments in eSystems Engineering (DeSE), pages 123–129.
- Dynamic User Verification Using Touch Keystroke Based on medians Vector Proximity. In Proceedings of the 7th International IEEE Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pages 121–126.
- Beyond passwords – challenges and opportunities of future authentication. IEEE Security & Privacy, 20(1):82–86.
- Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 1665–1680.
- Crawford, H. (2010). Keystroke dynamics: Characteristics and opportunities. In Proceedings of the 8th International IEEE Conference on Privacy, Security and Trust (PST), pages 205–212.
- Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics. Electronics, 10(14).
- A New Feature Scoring Method in Keystroke Dynamics-Based User Authentications. IEEE Access, 8:27901–27914.
- Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning. In Proceedings of the 2nd International ACM Conference on Biometric Engineering and Applications (ICBEA), pages 50–57.
- Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. Security and Communication Networks, 2018:2567463.
- Encyclopedia of Biometrics. Springer.
- Does Keystroke Dynamics tell us about Emotions? A Systematic Literature Review and Dataset Construction. In Proceedings of the 16th International IEEE Conference on Intelligent Environments (IE), pages 60–67.
- A Behavioral Biometric Authentication Framework on Smartphones. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS), pages 923–925.
- General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pages 93–104.
- Adversary Models for Mobile Device Authentication. ACM Comput. Surv., 54(9).
- Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 16(4):351–359.
- A systematic review on keystroke dynamics. Journal of the Brazilian Computer Society, 19(4):573–587.
- The Password Game: Negative Externalities from Weak Password Practices. In Alpcan, T., Buttyán, L., and Baras, J. S., editors, Decision and Game Theory for Security, pages 192–207. Springer Berlin Heidelberg.
- Usability assessment in a multi-biometric continuous authentication system. In Proceedings of the 7th IEEE Latin-American Symposium on Dependable Computing (LADC), pages 43–50.
- Recent Advances and Applications of Keystroke Dynamics. In Proceedings of the International IEEE Conference on Computational Intelligence and Knowledge Economy (ICCIKE), pages 680–683.
- Analysis of Algorithms for User Authentication using Keystroke Dynamics. In Proceedings of the International IEEE Conference on Communication and Signal Processing (ICCSP), pages 0337–0341.
- Srivastava, H. (2013). A Comparison Based Study on Biometrics for Human Recognition. IOSR Journal of Computer Engineering, 15:22–29.
- A Survey of Keystroke Dynamics Biometrics. The Scientific World Journal, 2013:408280.
- Person Authentication with BehavioSense Using Keystroke Biometrics. In Proceedings of the International ACM Conference on Pattern Recognition and Intelligent Systems (PRIS).
- A Survey about User Requirements for Biometric Authentication on Smartphones. In Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), pages 1–6.