Keystroke dynamics, keystroke biometrics, typing dynamics, and typing biometrics refer to the detailed timing information that describes each key press related event that occurs when a user types on a keyboard.[1]
Science
The behavioral biometric of keystroke dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad.[2][3][4] The keystroke rhythms of a user are measured to develop a unique biometric template of the user's typing pattern for future authentication.[5] Keystrokes are separated into static and dynamic typing, which are used to help distinguish between authorized and unauthorized users.[6] Vibration information may be used to create a pattern for future use in both identification and authentication tasks.
Data needed to analyze keystroke dynamics is obtained by keystroke logging. Typically, that information is retained by logging a typing session in which the sequence of characters correspond to the order in which keys were pressed. Timing information is discarded. For example, when reading an email, the receiver cannot tell from reading the phrase "I saw three zebras!" whether:
- It was typed rapidly or slowly,
- The sender used the left shift key, the right shift key, or the caps-lock key to capitalize "I"
- The letters were all typed at the same pace or if there was a long pause before any characters while looking for that key, and
- The sender typed any letters wrong initially and then went back and corrected them or if they got them right the first time.
History
During the late nineteenth century, telegram operators began to develop unique "signatures" that could be identified simply by their tapping rhythm.[7] As late as World War II, the military transmitted messages through Morse Code. Using a methodology called "The Fist of the Sender," military intelligence identified that an individual had a unique way of keying in a message's "dots" and "dashes", creating a rhythm that could help distinguish ally from enemy.[8][9]
Use as biometric data
Keystroke dynamic information could be used to verify or even try to determine the identity of the person who is producing the keystrokes.[10] The techniques used to do this vary widely in sophistication and range from statistical techniques to artificial intelligence (AI) approaches such as neural networks.
The time to seek and depress a key (seek-time) and the time the key is held down (hold-time) may be characteristic of an individual, regardless of the total speed at which they type. Most people take longer to find or get to specific letters on the keyboard than their average seek-time for all letters. Which letters require more time vary dramatically and consistently for different people. Right-handed people may be statistically faster in getting to keys they hit with their right-hand fingers than with their left-hand fingers. Index fingers may be faster than other fingers, consistent for a user regardless of their overall speed.
In addition, sequences of letters may have characteristic properties for a user. In English, the use of "the" is very common, and those three letters may be known as a rapid-fire sequence. Common endings, such as "ing", may be entered far faster than the same letters in reverse order ("gni") to the degree that varies consistently by user. This consistency may hold and reveal common sequences of the user's native language even when they are writing entirely in a different language.
Common "errors" may also be quite characteristic of a user. There is a taxonomy of errors, such as the user's most common "substitutions", "reversals", "drop-outs", "double-strikes", "adjacent letter hits", "homonyms" and hold-length-errors (for a shift key held down too short or too long a time). Even without knowing what language the user is working in, these errors may be detected by looking at the rest of the text and what letters the user goes back and replaces.
Authentication versus identification
Keystroke dynamics is part of a larger class of biometrics known as behavioural biometrics, a field in which observed patterns are statistical in nature. Because of this inherent uncertainty, a commonly held belief is that behavioural biometrics are not as reliable as biometrics used for authentication based on physically observable characteristics such as fingerprints or retinal scans or DNA. Behavioural biometrics use a confidence measurement in replacement of the traditional pass/fail measurements. As such, the traditional benchmarks of False Acceptance Rate (FAR) and False Rejection Rates (FRR) no longer have linear relationships.
The benefit to keystroke dynamics (as well as other behavioural biometrics) is that FRR/FAR can be adjusted by changing the acceptance threshold at the individual level. This allows for explicitly defined individual risk mitigation that physical biometric technologies could not achieve.
One of the major problems that keystroke dynamics runs into is that a user's typing varies substantially during a day and between different days and may be affected by any number of external factors.
Because of these variations, any system will make false-positive and false-negative errors. Some successful commercial products have strategies to handle these issues and have proven effective in large-scale use in real-world settings and applications.
Legal and regulatory issues
Use of keylogging software may be in direct and explicit violation of local laws, such as the U.S. Patriot Act, under which such use may constitute wire-tapping.
Patents
- US patent 9430626, John D. Rome, Bethann G. Rome and Thomas E. Ketcham II, "User authentication via known text input cadence", issued 2012
- US patent 7509686, John C. Checco, "Method for providing computer-based authentication utilizing biometrics", issued 2009
- US patent 7206938, S. Blender and H. Postley, "Key sequence rhythm recognition system and method", issued 2007
- US patent 4621334, J. Garcia, "Personal identification apparatus", issued 1986
- US patent 4805222, J.R. Young and R.W. Hammon, "Method and apparatus for verifying an individual's identity", issued 1989
- P. Nordström, J. Johansson. Security system and method for detecting intrusion in a computerized system. Patent No. 2 069 993, European Patent Office, 2009.
- US patent 8230232, A. Awad and I. Traore, "System and method for determining a computer user profile from a motion-based input device", issued 2012
Other uses
Because human beings generate keystroke timings, they are not well correlated with external processes. They are frequently used as a source of hardware-generated random numbers for computer systems.
Mental health symptoms such as depression and anxiety have also been correlated with keystroke timing features.[11]
See also
References
- ↑ Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Ahmet Camtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici (2009). Identity theft, computers and behavioral biometrics (PDF). Proceedings of the IEEE International Conference on Intelligence and Security Informatics. pp. 155–160.
{{cite conference}}
: CS1 maint: multiple names: authors list (link) - ↑ Deng, Y.; Yu, Y. (2013). "Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets". ISRN Signal Processing. 2013: 565183. doi:10.1155/2013/565183.
- ↑ "User authentication through typing biometrics features" (PDF). Archived from the original (PDF) on 2014-03-04. Retrieved 2013-11-14.
- ↑ Continuous authentication by analysis of keyboard typing characteristics
- ↑ A modified algorithm for user identification by his typing on the keyboard
- ↑ Alzubaidi, Abdulaziz; Kalita, Jugal (2016). "Authentication of Smartphone Users Using Behavioral Biometrics". IEEE Communications Surveys & Tutorials. 18 (3): 1998–2026. arXiv:1911.04104. doi:10.1109/comst.2016.2537748. ISSN 1553-877X. S2CID 8443300.
- ↑ Monrose, Fabian, and Aviel D. Rubin. "Keystroke dynamics as a biometric for authentication". Future Generation Computer Systems.
{{cite journal}}
: CS1 maint: multiple names: authors list (link) - ↑ "Keystroke Dynamics". Biometrics. Retrieved 2018-01-18.
- ↑ Haring, Kristen (2007). Ham Radio's Technical Culture. MIT Press. p. 23. ISBN 978-0-262-08355-3.
- ↑ Lu, Xiaofeng; Zhang, Shengfei; Hui, Pan; Lio, Pietro (2020-09-01). "Continuous authentication by free-text keystroke based on CNN and RNN". Computers & Security. 96: 101861. doi:10.1016/j.cose.2020.101861. ISSN 0167-4048.
- ↑ Braund, Taylor A.; O’Dea, Bridianne; Bal, Debopriyo; Maston, Kate; Larsen, Mark E.; Werner-Seidler, Aliza; Tillman, Gabriel; Christensen, Helen (2023-05-15). "Associations Between Smartphone Keystroke Metadata and Mental Health Symptoms in Adolescents: Findings From the Future Proofing Study". JMIR Mental Health. 10: e44986. doi:10.2196/44986. PMC 10227695. PMID 37184904.
Other references
- Checco, J. (2003). Keystroke Dynamics & Corporate Security. WSTA Ticker Magazine,
- Bergadano, F.; Gunetti, D.; Picardi, C. (2002). "User authentication through Keystroke Dynamics". ACM Transactions on Information and System Security. 5 (4): 367–397. doi:10.1145/581271.581272. S2CID 507476.
- iMagic Software. (vendor web-site May 2006). Notes: Vendor specializing in keystroke authentication for large enterprises.
- AdmitOne Security - formerly BioPassword. (vendor web-site home [Web Page]. URL . Notes: Vendor specializing in keystroke dynamics
- Garcia, J. (Inventor). (1986). Personal identification apparatus. (USA 4621334). Notes: US Patent Office -
- Bender, S and Postley, H. (Inventors) (2007). Key sequence rhythm recognition system and method. (USA 7206938), Notes: US Patent Office -
- Joyce, R., & Gupta, G. (1990). Identity authorization based on keystroke latencies. Communications of the ACM, 33(2), 168-176. Notes: Review up through 1990
- Mahar, D.; Napier, R.; Wagner, M.; Laverty, W.; Henderson, R. D.; Hiron, M. (1995). "Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions". International Journal of Human-Computer Studies. 43 (4): 579–592. doi:10.1006/ijhc.1995.1061. S2CID 206564985.
- Monrose, Fabian; Rubin, Aviel (1997). "Authentication via keystroke dynamics". Proceedings of the 4th ACM conference on Computer and communications security - CCS '97. New York, New York, USA: ACM Press. pp. 48–56. doi:10.1145/266420.266434. ISBN 0-89791-912-2. much cited
- Monrose, Fabian; Rubin, Aviel D. (2000). "Keystroke dynamics as a biometric for authentication" (PDF). Future Generation Computer Systems. Elsevier BV. 16 (4): 351–359X. doi:10.1016/s0167-739x(99)00059-x. ISSN 0167-739X. S2CID 1202473.
- Monrose, F. R. M. K., & Wetzel, S. (1999). Password hardening based on keystroke dynamics. Proceedings of the 6th ACM Conference on Computer and Communications Security, 73-82. Notes: Kent Ridge Digital Labs, Singapore
- Robinson, J.A.; Liang, V.W.; Chambers, J.A.M.; MacKenzie, C.L. (1998). "Computer user verification using login string keystroke dynamics". IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans. Institute of Electrical and Electronics Engineers (IEEE). 28 (2): 236–241. doi:10.1109/3468.661150. ISSN 1083-4427.
The keystroke dynamics of a computer user's login string provide a characteristic pattern that can be used for identity verification. Timing vectors for several hundred login attempts were collected for ten "valid" users and ten "forgers", and classification analysis was applied to discriminate between them. Three different classifiers were applied, and in each case the key hold times were more effective features for discrimination than the interkey times. Best performance was achieved by an inductive learning classifier using both interkey and hold times. A high rate of typographical errors during login entry is reported. In practice, these are usually corrected errors-that is, they are strings which include backspaces to correct earlier errors-but their presence confounds the use of typing-style analysis as a practical means of securing access to computer systems.
- Young, J. R., & Hammon, R. W. (Inventors). (1989). Method and apparatus for verifying an individual's identity. 4805222). Notes: US Patent Office -
- Vertical Company LTD. (vendor web-site October 2006). Notes: Vendor specializing in keystroke authentication solutions for government and commercial agencies.
- Lopatka, M. & Peetz, M.H. (2009). Vibration Sensitive Keystroke Analysis. Proceedings of the 18th Annual Belgian-Dutch Conference on Machine Learning, 75-80. Archived 2009-03-24 at the Wayback Machine
- Coalfire Systems Compliance Validation Assessment (2007) https://web.archive.org/web/20110707084309/http://www.admitonesecurity.com/admitone_library/AOS_Compliance_Functional_Assessment_by_Coalfire.pdf
- Karnan, M.Akila (2011). "Biometric personal authentication using keystroke dynamics: A review". Applied Soft Computing Journal. 11 (2): 1565–1573. doi:10.1016/j.asoc.2010.08.003.
- Jenkins, Jeffrey; Nguyen, Quang; Reynolds, Joseph; Horner, William; Szu, Harold (2011-05-13). "The physiology of keystroke dynamics". In Szu, Harold (ed.). Independent Component Analyses, Wavelets, Neural Networks, Biosystems, and Nanoengineering IX. Vol. 8058. SPIE. pp. 80581N. doi:10.1117/12.887419.
Further reading
- Vaas, Lisa (30 July 2015). "Websites can track us by the way we type—here's how to stop it". Naked Security. Sophos. Retrieved 2018-02-01.
- Walsh, Ray (1 November 2016). "Keyboard Privacy: Building Profiles from How We Type". BestVPN. Retrieved 2018-02-01.