Learning User Keystroke Patterns for Authentication

  • Zhao Y
  • 26


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


Keystroke authentication is a new access control system to identify
legitimate users via their typing behavior. In this paper, machine
learning techniques are adapted for keystroke authentication. Seven
learning methods are used to build models to differentiate user
keystroke patterns. The selected classification methods are Decision
Tree, Naive Bayesian, Instance Based Learning, Decision Table, One Rule,
Random Tree and K-star. Among these methods, three of them are studied
in more details. The results show that machine learning is a feasible
alternative for keystroke authentication. Compared to the conventional
Nearest Neighbour method in the recent research, learning methods
especially Decision Tree can be more accurate. In addition, the
experiment results reveal that 3-Grams is more accurate than 2-Grams and
4-Grams for feature extraction. Also, combination of attributes tend to
result higher accuracy.

Author-supplied keywords

  • bayesian
  • chine learning
  • decision tree
  • instance-based learning
  • keystroke authentication
  • ma-
  • pattern recognition

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Ying Zhao

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free