The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2013 vol.15)
pp: 24-28
J. Morris Chang , Iowa State University
Chi-Chen Fang , Iowa State University
Kuan-Hsing Ho , Iowa State University
Norene Kelly , Iowa State University
Pei-Yuan Wu , Princeton University
Yixiao Ding , Iowa State University
Chris Chu , Iowa State University
Stephen Gilbert , Iowa State University
Amed E. Kamal , Iowa State University
Sun-Yuan Kung , Princeton University
ABSTRACT
Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of a special issue on security.
INDEX TERMS
Biometrics (access control), Keystrokes, Authentication, Training, Fingerprint recognition, information technology, security, continuous authentication, keystroke dynamics
CITATION
J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Amed E. Kamal, Sun-Yuan Kung, "Capturing Cognitive Fingerprints from Keystroke Dynamics", IT Professional, vol.15, no. 4, pp. 24-28, July-Aug. 2013, doi:10.1109/MITP.2013.52
REFERENCES
1. F. Bergadano et al., “User Authentication through Keystroke Dynamics,” ACM Trans. Information and System Security, Nov. 2002 pp. 367-397.
2. D. Gunetti and C. Picardi, “Keystroke Analysis of Free Text,” ACM Trans. Information and System Security, vol. 8, no. 3, 2005 pp. 312-347.
3. M. Karnan et al., “Biometric Personal Authentication Using Keystroke Dynamics: A Review,” Applied Soft Computing, vol. 11, no. 2, 2011 pp. 1565-1573.
4. F. Monrose et al., “Password Hardening Based on Keystroke Dynamics,” Proc. 6th ACM Conf. Computer and Communications Security, ACM, 1999 pp. 73-82.
5. C.M. Levy and S. Ransdell, “Writing Signatures,” The Science of Writing: Theories, Methods, Individual Differences, and Applications, Lawrence Erlbaum, 1996 pp. 149-162.
6. D. McCutchen, “A Capacity Theory of Writing: Working Memory in Composition,” Educational Psychology Rev., vol. 8, no. 3, 1996 pp. 299-325.
7. D. McCutchen, “Knowledge, Processing, and Working Memory: Implications for a Theory of Writing,” Educational Psychologist, vol. 35, no. 1, 2000 pp. 13-23.
8. T. Olive, “Working Memory in Writing: Empirical Evidence from the Dual-Task Technique,” European Psychologist, vol. 9, no. 1, 2001 pp. 32-42.
9. T. Olive et al., “Verbal, Visual, and Spatial Working Memory Demands During Text Composition,” Applied Psycholinguistics, vol. 29, no. 4, 2008 pp. 669-687.
10. C.-C. Chang and C.-J. Lin, “LIBSVM: A Library for Support Vector Machines,” ACM Trans. Intelligent Systems and Technology, vol. 2, no. 3, 2011, article no. 27.
11. S.Y. Kung, Kernel Methods and Machine Learning, Cambridge Univ. Press, 2013
13 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool