A Systematic Literature Review on Latest Keystroke Dynamics Based Models

被引:10
作者
Roy, Soumen [1 ]
Pradhan, Jitesh [2 ]
Kumar, Abhinav [2 ]
Adhikary, Dibya Ranjan Das [2 ]
Roy, Utpal [3 ]
Sinha, Devadatta [1 ]
Pal, Rajat Kumar [1 ]
机构
[1] Univ Calcutta, Dept Comp Sci & Engn, Acharya Prafulla Chandra Roy Siksha Prangan, Kolkata 700106, India
[2] Siksha O Anusandhan Univ, Dept Comp Sci & Engn, Bhubaneswar 751030, Odisha, India
[3] Visva Bharati, Dept Comp Syst Sci, Santini Ketan 731235, W Bengal, India
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Authentication; Biometrics (access control); Passwords; Behavioral sciences; Security; Knowledge based systems; Keystroke dynamics; Identification of persons; Behavioural biometrics; computer security; keystroke dynamics; trait prediction; typing patterns; user authentication; user identification; CONTINUOUS AUTHENTICATION; USER AUTHENTICATION; BIOMETRIC AUTHENTICATION; PERFORMANCE EVALUATION; IDENTIFICATION; VERIFICATION; SMARTPHONES; PASSWORD; FUSION; SENSOR;
D O I
10.1109/ACCESS.2022.3197756
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most recent studies on the implications of keystroke dynamics (KD) patterns in user authentication, identification, and the determination of useful information. Another aim is to provide an extensive and up-to-date survey of the recent literature and potential research directions to understand the present state-of-the-art methodologies in this particular domain that are expected to be beneficial for the KD research community. From January 1st, 2017 to March 13th, 2022, the popular six electronic databases have been searched using a search criterion ("keystroke dynamics" OR "typing pattern") AND ("authentication" OR "verification" OR "identification"). With this criterion, a total of nine thousand three hundred forty-eight results, including duplicates, were produced. However, one thousand five hundred forty-seven articles have been chosen after removing duplicates and preliminary screening. Due to insufficient information, only one hundred twenty-seven high-quality quantitative research articles have been included in the article selection process. We compared and summarised several factors with multiple tables to comprehend the various methodologies, experimental settings, and findings. In this study, we have identified six unique KD-based designs and presented the status of findings toward an effective solution in authentication, identification, and prediction. We have also discovered considerable heterogeneity across studies in each KD-based design for desktops and smartphones separately. Finally, this paper found a few open research challenges and provided some indications for a deeper understanding of the issues and further study.
引用
收藏
页码:92192 / 92236
页数:45
相关论文
共 392 条
[41]   Fast Free-Text Authentication via Instance-Based Keystroke Dynamics [J].
Ayotte B. ;
Banavar M. ;
Hou D. ;
Schuckers S. .
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020, 2 (04) :377-387
[42]  
Baban A. B., 2019, J CRIT REV, V7, P2020
[43]   The impact of application context on privacy and performance of keystroke authentication systems [J].
Balagani, Kiran S. ;
Gasti, Paolo ;
Elliott, Aaron ;
Richardson, Azriel ;
O'Neal, Mike .
JOURNAL OF COMPUTER SECURITY, 2018, 26 (04) :543-556
[44]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[45]  
Bangor A, 2009, J USABILITY STUD, V4, P114
[46]   Authentication of Remote IoT Users Based on Deeper Gait Analysis of Sensor Data [J].
Batool, Samera ;
Hassan, Ali ;
Saqib, Nazar Abbas ;
Khattak, Muazzam A. Khan .
IEEE ACCESS, 2020, 8 :101784-101796
[47]  
Baynath P., 2019, PROC C NEXT GENER CO, P1
[48]  
Baynath P., 2019, PROC C NEXT GENER CO, P11
[49]   Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics [J].
Baynath, Purvashi ;
Soyjaudah, Sunjiv ;
Khan, Maleika Heenaye-Mamode .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (04) :651-661
[50]  
Baynath P, 2018, 2018 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC), P11, DOI 10.1109/SPC.2018.8704135