Keystroke analysis as a method of advanced user authentication and response

40Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

There has been significant interest in the area of keystroke analysis to support the authentication of users, and previous research has identified three discrete methods of application; static, periodic dynamic and continuous dynamic analysis. This paper summarises the approaches and metrics arising from previous work, and then proceeds to introduce a new variation, based upon application-specific keystroke analysis. The discussion also considers the use of keystroke analysis as a progressive, escalating response measure in the context of a comprehensive user authentication and supervision system, presenting an example of how this could be realised in practice.

Cite

CITATION STYLE

APA

Dowland, P. S., Fvrnell, S. M., & Papadaki, M. (2002). Keystroke analysis as a method of advanced user authentication and response. In IFIP Advances in Information and Communication Technology (Vol. 86, pp. 215–226). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-0-387-35586-3_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free