Keystroke Dynamics Based User Authentication System

Authors

  • K. Ranjith Kumar Postgraduate Scholar, Department of Computer Science and Engineering, Sri Venkateswara Institute of Science and Technology, Chennai, Tamil Nadu, India
  • A. N. Arun Professor, Department of Computer Science and Engineering, Sri Venkateswara Institute of Science and Technology, Chennai, Tamil Nadu, India

DOI:

https://doi.org/10.46610/RTAIA.2025.v04i02.009

Keywords:

Authentication, Biometric (face recognition, fingerprints, signature), Gaussian Mixture Model (GMM), Machine learning, Manhattan distance, Vector machine

Abstract

Keystroke dynamics refer to the unique patterns of how an individual types on a keyboard. These patterns can be used for biometric identification or authentication, based on the assumption that every user has a distinct typing style. Keystroke dynamics are part of behavioral biometrics, and feature extraction is a crucial step in analyzing keystroke patterns for identification or authentication purposes. In keystroke dynamics, the goal of feature extraction is to capture the distinctive typing behavior of individuals in a numerical or structured format, which can be used in further stages such as classification, verification, or identification and is stored in a database. The two primary purposes of authentication are, firstly, to accurately identify users who are authorized to access private resources and to deny access to those who are not, and secondly, to provide assurance to users that their resources are safeguarded and protected from unauthorized individuals, who often have malicious intent when attempting to access personal resources. Authentication methods have advanced from ancient knocking rhythms to modern face recognition, fingerprint scanning, and signature verification. These methods typically require a combination of two components to verify a user's identity. In this project, users are recognized by identifying their keystroke dynamics in addition to using passwords, employing machine learning and support vector machine classifiers. The typing patterns of users are analyzed to verify their authenticity using machine learning techniques. The Gaussian Mixture Model (GMM), an unsupervised learning method for pattern recognition, is used. The Manhattan distance, also called the taxicab distance or city block distance, calculates the distance between two real-valued vectors (i.e., the distance between keystrokes in this work). Since individuals type in statistically significant yet different ways, an individual's typing pattern differs greatly from that of others, which increases the accuracy of the authentication system.

References

S. Singh, A. Inamdar, A. Kore, and A. Pawar, "Analysis of algorithms for user authentication using keystroke dynamics," in Proc. 2020 Int. Conf. Communication and Signal Processing (ICCSP), 28 Jul. 2020, pp. 337-341. doi: https://doi.org/10.1109/ICCSP48568.2020.9182115

A. Amin, I. Haq, and M. Nazir, "Two factor authentication," International Journal of Computer Science and Mobile Computing, vol. 6, no. 7, pp. 5-8, Jul. 2017. Available: https://www.ijcsmc.com/docs/papers/July2017/V6I7201707.pdf

R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, "Authentication by keystroke timing: Some preliminary results," May 1, 1980. Available: https://apps.dtic.mil/sti/html/tr/ADA484022/

D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of Global Optimization, vol. 39, no. 3, pp. 459-471, Nov. 2007. Available: https://doi.org/10.1007/s10898-007-9149-x

M. Karnan, M. Akila, and N. Krishnaraj, "Biometric personal authentication using keystroke dynamics: A review," Applied Soft Computing, vol. 11, no. 2, pp. 1565-1573, Mar. 2011, doi: https://doi.org/10.1016/j.asoc.2010.08.003

W. Zhou, H. Li, and Q. Tian, "Recent advance in content-based image retrieval: A literature survey," Arxiv Preprint, arXiv:1706.06064, Jun. 2017. Available: https://arxiv.org/abs/1706.06064

A. Nodari, M. Ghiringhelli, A. Zamberletti, M. Vanetti, S. Albertini, and I. Gallo, "A mobile visual search application for content-based image retrieval in the fashion domain," in Proc. 2012 10th Int. Workshop on Content-Based Multimedia Indexing (CBMI), Annecy, France, Jun. 2012, pp. 1-6. doi: https://doi.org/10.1109/CBMI.2012.6269838

Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, "Gradient-based learning applied to document recognition," Proceedings of the IEEE, vol. 86, no. 11, pp. 2278-2324, Nov. 1998. Available: https://doi.org/10.1109/5.726791

R. Zhang and Z. Zhang, "Addressing CBIR efficiency, effectiveness, and retrieval subjectivity simultaneously," in Proc. 5th ACM SIGMM Int. Workshop on Multimedia Information Retrieval, 2003, pp. 71-78. doi: https://doi.org/10.1145/973264.973276

H. J. Jeong, K. S. Park, and Y. G. Ha, "Image preprocessing for efficient training of YOLO deep learning networks," in Proc. 2018 IEEE Int. Conf. Big Data and Smart Computing (BigComp), Shanghai, China, Jan. 2018, pp. 635-637. doi: https://doi.org/10.1109/BigComp.2018.00113

A. Daribay, M. S. Obaidat, and P. V. Krishna, "Analysis of authentication system based on keystroke dynamics," in Proc. 2019 Int. Conf. Computer, Information and Telecommunication Systems (CITS), Beijing, China, Aug. 2019, pp. 1-6. doi: https://doi.org/10.1109/CITS.2019.8862068

Published

2025-07-30

Issue

Section

Articles