Affiliation:
1. University of Torino, Torino, Italy
Abstract
Keystroke dynamics can be useful to ascertain personal identity even
after
an authentication phase has been passed, provided that we are able to deal with the typing rhythms of free text, chosen and entered by users without any specific constraint. In this paper we present a method to compare typing samples of free text that can be used to verify personal identity. We have tested our technique with a wide set of experiments on 205 individuals, obtaining a False Alarm Rate of less than 5% and an Impostor Pass Rate of less than 0.005%. Different trade-offs are, however, possible. Our approach can rely on what is typed by people because of their normal job, and a few lines of text, even collected in different working sessions, are sufficient to reach a high level of accuracy, which improves proportionally to the amount of available information: As a consequence, we argue that our method can be useful in computer security as a complementary or alternative way to user authentication and as an aid to intrusion detection.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference26 articles.
1. Biometrics: Advanced Identity Verification
2. Ashbourn J. 2000b. The distinction between authentication and identification. Paper available at the Avanti Biometric Reference Site. (homepage.ntlworld.com/avanti). Ashbourn J. 2000b. The distinction between authentication and identification. Paper available at the Avanti Biometric Reference Site. (homepage.ntlworld.com/avanti).
3. BBC 2000. You must remember this… that and other. BBC News. Also available at: news.bbc.co.uk/hi/english/uk/newsid_720000/720976.stm. BBC 2000. You must remember this… that and other. BBC News. Also available at: news.bbc.co.uk/hi/english/uk/newsid_720000/720976.stm.
4. User authentication through keystroke dynamics
Cited by
229 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献