A Survey on Keystroke Dynamics Based Authentication System

Authors

  • Ravi Kiran  Department of Computer Science Babasaheb Bhimrao Ambedkar University Lucknow, India
  • Sarita Soni  Department of Computer Science Babasaheb Bhimrao Ambedkar University Lucknow, India

Keywords:

Behavioral Analysis, Static Authentication, User Authentication, Keystroke Dynamics, Verification.

Abstract

In the keystroke dynamics, we face many types of error and problems in user authentication. In this new types of static authentication method where we found the selective data or information is described the user keystroke. By the experiments of this authentication problem we applicable to substantiated and optimize the condition for the selected and implemented of the method. In this approach, we only discuss the limitation, strength, facts which are combined the behavioral biometric trait. Finally, in this research field, we face the different types of open research problems and challenges.

References

  1. Prof. Dharmendra Singh, Bhawnesh Jaggi, Himanshu Nayyar, Amit Kumar, "Presskey- A Keystrokes Dynamics Based Authentication System" International Journal of Advanced Research in Computer Science, Volume 8 No. 5, May- June 2017, pp. 2665-2670.
  2. V. Yu. Kaganov, A.K. Korolev, M. N. Krylov, I. V. Mashechkin, M. I. Petrovskii, "Machine Learning Methods In Authentication Problems Using Password Keystroke Dynamics", Computational Mathematics and Modeling, Volume 26 No. 3, July 2015, pp. 398-407.
  3. Ahmed Mahfouz, Tarek M. Mahmoud, ahmed Sharaf Eldin, "A survey on behavioral biometrics authentication on smartphones", Journal of Information Security and Applications, Elsevier, 2017, pp. 28-37.
  4. Ravi Kiran, Sarita Soni, "A Keystroke Dynamics Based Authentication System", International Journal of Computer Science Trends and Technology, Volume 6 Issue 2, Mar-Apr 2018, pp. 53-55.
  5. P.H. Pisani, A.C. Lorena, "Emphasizing typing signature in keystroke dynamics using immune algorithms," Applied Soft Computing Volume 34, September 2015, pp 178–193, Elsevier Press, DOI: 10.1016/j.asoc.2015.05.008
  6. D. Shanmugapriya, G. Padmavathi, "Virtual Key Force-A New Feature for Keystroke," J. International Journal of Engineering Science and Technology, Vol. 3 No. 10 October 2011, pp. 738-743.
  7. A. K. Jain, R. Bolle, and S. Pankanti (editors), Biometrics: Personal Identification in a Networked Society, Kluwer Academic Publishers, 1999.
  8. K. Wangsuk, T.A. Amornkul, "Trajectory Mining for Keystroke Dynamics Authentication," Procedia Computer Science, Volume 24, 2013, Elsevier Press, pp 175-183, DOI: 10.1016/j.procs.2013.10.041
  9. R. Thanganayagam, A. Thangadurai, "Hybrid Model with Fusion Approach to Enhance the Efficiency of Keystroke Dynamics Authentication," Proc 3rd International Conference on Advanced Computing, Networking and Informatics, Oct 2015, SIST vol 43, Springer Press, pp 85-96, DOI: 10.1007/978-81-322-2538-6_10
  10. G. Jagadamba, S.P. Sharmila, T. Gouda, "A Secured Authentication System Using an Effective Keystroke Dynamics," Proc Emerging Research in Electronics, Computer Science and Technology, 2013. LNEE vol 248 Springer press, pp 453-460, DOI: 10.1007/978-81-322-1157-0_46

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Ravi Kiran, Sarita Soni, " A Survey on Keystroke Dynamics Based Authentication System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1930-1934, March-April-2018.