The original dream of Keystroke Analysis was the same as that of other biometric techniques: replacing traditional authentication methods with techniques based on the analysis of the typing dynamics of users. Unfortunately, until now a sufficient level of accuracy and user friendliness for practical applications has not been achieved. However, typing rhythms are available throughout an entire login session and, if we can perform Keystroke Analysis of free text, we can implement one of the best applications of continuous authentication: Intrusion Detection. In this case, an accuracy that is still not acceptable for access control can be more than sufficient as part of an Intrusion Detection policy, where (1) alarms that have been raised must in any case be validated by a human (e.g., a system administrator); (2) intrusions are normally detected joining together different techniques, in order to improve the resulting accuracy. In this chapter we discuss the potentialities of Keystroke Analysis as a tool for Intrusion Detection and other security applications, and investigate experimentally how the accuracy of the analysis scales with the increase of the number of individuals involved, a fundamental issue if we want to add Keystroke Analysis to the set of tools that can be used to improve the security of our computers and networks.

Keystroke Analysis as a Tool for Intrusion Detection

GUNETTI, Daniele;PICARDI, Claudia
2012-01-01

Abstract

The original dream of Keystroke Analysis was the same as that of other biometric techniques: replacing traditional authentication methods with techniques based on the analysis of the typing dynamics of users. Unfortunately, until now a sufficient level of accuracy and user friendliness for practical applications has not been achieved. However, typing rhythms are available throughout an entire login session and, if we can perform Keystroke Analysis of free text, we can implement one of the best applications of continuous authentication: Intrusion Detection. In this case, an accuracy that is still not acceptable for access control can be more than sufficient as part of an Intrusion Detection policy, where (1) alarms that have been raised must in any case be validated by a human (e.g., a system administrator); (2) intrusions are normally detected joining together different techniques, in order to improve the resulting accuracy. In this chapter we discuss the potentialities of Keystroke Analysis as a tool for Intrusion Detection and other security applications, and investigate experimentally how the accuracy of the analysis scales with the increase of the number of individuals involved, a fundamental issue if we want to add Keystroke Analysis to the set of tools that can be used to improve the security of our computers and networks.
2012
Continuous Authentication Using Biometrics: Data, Models, and Metrics
IGI Global
Information Science Reference
193
211
9781613501290
Behavioral Biometrics; Keystroke Analysis; Free Text; User Authentication; Continuous Authentication; Intrusion Detection; Password Recovery; Identity Tracing over the Internet.
Gunetti Daniele; Picardi Claudia
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2318/80521
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact