CLICKA: Collecting and leveraging identity cues with keystroke dynamics

被引:4
作者
Buckley, Oliver [1 ]
Hodges, Duncan [2 ]
Windle, Jonathan [1 ]
Earl, Sally [1 ]
机构
[1] Univ East Anglia, Sch Comp Sci, Norwich, England
[2] Cranfield Univ, Def Acad United Kingdom, Ctr Elect Warfare Informat & Cyber, Cranfield SN68LA, England
关键词
Biometrics; Keystroke dynamics; Identification; Behavioural biometrics; Security; Identity; BIOMETRICS;
D O I
10.1016/j.cose.2022.102780
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The way in which IT systems are usually secured is through the use of username and password pairs. However, these credentials are all too easily lost, stolen or compromised. The use of behavioural biomet-rics can be used to supplement these credentials to provide a greater level of assurance in the identity of an authenticated user. However, user behaviours can also be used to ascertain other identifiable informa-tion about an individual. In this paper we build upon the notion of keystroke dynamics (the analysis of typing behaviours) to infer an anonymous user's name and predict their native language. This work found that there is a discernible difference in the ranking of bigrams (based on their timing) contained within the name of a user and those that are not. As a result we propose that individuals will reliably type in-formation they are familiar with in a discernibly different way. In our study we found that it should be possible to identify approximately a third of the bigrams forming an anonymous users name purely from how (not what) they type.(c) 2022 The Authors. Published by Elsevier Ltd.This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:7
相关论文
共 27 条
[1]  
[Anonymous], 2016, PROC 22 ACM SIGKDD I, DOI DOI 10.1145/2939672.2939785
[2]  
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[3]   COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS [J].
BLEHA, S ;
SLIVINSKY, C ;
HUSSIEN, B .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) :1217-1222
[4]  
Delac K, 2004, PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, P184
[5]   The reliability of user authentication through keystroke dynamics [J].
Douhou, Salima ;
Magnus, Jan R. .
STATISTICA NEERLANDICA, 2009, 63 (04) :432-449
[6]  
Dvorak A., 1936, TYPEWRITING BEHAV
[7]  
Epp C, 2011, 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, P715
[8]  
Fitts P., 1967, Human performance, P2
[9]   Choosing passwords: Security and human factors [J].
Gehringer, EF .
SOCIAL IMPLICATIONS OF INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, :369-373
[10]  
Giot R., 2011, Biometrics IntechOpen, V1, P157