Keystroke Dynamics Algorithm for Securing Web-based Password Driven Systems

Main Article Content

Michael Boakye Osei
Enoch Opanin Gyamfi
Mohammed Okoe Alhassan


Web security is a critical aspect for many web-based applications, along its research track, keystroke dynamics techniques have attracted broad interests due to their high efficiency in security. In this paper, the aim was to come out with a keystroke login system that overcomes the typical challenges associated with keystroke dynamics and improves on password security but with focus on irritability nature of keystroke dynamics based systems. Specifically, we proposed two stages user matching method, training/enrolment phase of users and authenticating registered users with previously stored data. Furthermore, the proposed algorithm added dwell, flight times and multiplied by the locate time to get the upper and lower bounds. Moreover, the uniform differences between the bound timings were calculated to further enhance security. Experimental results show that the proposed keystroke dynamics approach used in augmenting password security emerged to be superior as compared to existing customary distance metrics.

Keystroke dynamics, web security, user credentials, flight time.

Article Details

How to Cite
Boakye Osei, M., Opanin Gyamfi, E., & Okoe Alhassan, M. (2020). Keystroke Dynamics Algorithm for Securing Web-based Password Driven Systems. Asian Journal of Research in Computer Science, 4(4), 1-26.
Original Research Article


Monrose R, Rubin A. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems. 1999; 16(4):351-359.

Krause M, Tipton HF. Handbook of information security management. CRC Press LLC, Boca Raton. 2011;5.

Osei BM, Missah YM. Utilizing Keystroke Dynamics as an additional security measure to password security in computer web-based applications - A Case Study of UEW. International Journal of Computer Applications. 2016;149(5):35-44.

Chourasia N. Authentication of the user by keystroke dynamics for banking transaction system‖, Proceedings of International Conference on Advances in Engineering & Technology. 2014;41–45.

Nisha JR, Kumar Anto RP. User authentication based on Keystroke Dynamics. Journal of Engineering Research and Applications. 2014;4(3): (Version 1):345-349.
[ISSN: 2248-9622]

Ahmed A, Traore I. Biometric recognition based on free-text Keystroke Dynamics, IEEE Transactions on Cybernetics. 2014; 44(4):458–472.

Senk C, Dotzler F. Biometric authentication as a servicefor enterprise identity management deployment: A data protection perspective, in Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES’11). 2011;43–50.

Leedy PD, Ormrod JE. Practical research planning and design. 10th ed. Boston: Pearson; 2013.

Kaewwit C, Lursinsap C, Sophatsathit P. High accuracy EEG biometrics identification using ICA and AR model. Journal of Information and Communication Technology. 2017;16(2):354–373.

Bajaj S, Kaur S. Typing speed analysis of human for password protection (Based on Keystrokes Dynamics). International Journal of Innovative Technology and Exploring Engineering. 2013;3(2).

Rudrapal SD, Debbarma S. Improvisation of biometrics authentication, 10th International Conference, ICDCIT 2014, Bhubaneswar, India. 2014;287–292.

Wilson AAT, Nandita B, Bala S. Privacy-preserving biometrics authentication systems using fully homomorphic encryption. International Journal of Pervasive Computing and Communications. 2015;11(2):151- 168.

Krishnamoorthy S, Rueda L, Saad S, Elmiligi H. Identification of user behavioral biometrics for authentication using Keystroke Dynamics and machine learning. Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications - ICBEA 18; 2018.

Odei-Lartey EO, Boateng D, Danso S, Kwarteng A, Abokyi L, Amenga-Etego S, Owusu-Agyei S. The application of a biometric identification technique for linking community and hospital data in rural Ghana. Global Health Action. 2016;9: 29854.

Boopathi M, Aramudhan M. Dual-stage biometrics-based password authentication scheme using smart cards. Cybernetics and Systems. 2017;48(5):415–435.

Attila M, Zoltán B, László C. Strengthening passwords by Keystroke Dynamics IEEE international workshop on intelligent data acquisition and advanced computing systems: Technology and Applications. Dortmund, Germany; 2007.

Venugopal PC, Viji KSA. Applying empirical thresholding algorithm for a keystroke dynamics based authentication system. Journal of Information and Communication Technology. 2019;18(4): 383-413.

Mondal S, Bours P. Person identification by keystroke dynamics using pairwise user coupling. IEEE Transactions on Information Forensics and Security. 2017; 12(6):1319–1329.

Maheswari T, Anitha S. User authentication based on biometrics for convincing user in keystroke dynamics‖, ISR National Journal of Advanced Research in Computer Science Engineering and Information Technology. 2014;1(1): 63–70.

Kim J, Kim H, Kang P. Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Applied Soft Computing. 2018;62:1077 1087.

Wangsuk K, Anusas-amornkul T. Trajectory mining for keystroke dynamics authentication. Procedia Computer Science. 2013;24:175.

Brochoux A, Clarke NL. Deployment of keystroke analysis on a smartphone. Australian Information Security Management Conference, Edith Cowan University: Perth, Western Australia; 2008.

The PS, Teoh ABJ, Shigang Y. A survey of keystroke dynamics biometrics. The Scientific World Journal. Hindawi Publishing Corporation. 2013;24.
[Article ID 408280]

Krishna DR. Keystroke Dynamics - Dangling issues of providing authentication by Recognising User Input. Control Theory and Informatics. 2014;4(1).
[ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)]

Ngugi B, Kahn BK, Tremaine M. Typing biometrics: Impact of human learning on performance quality. Journal of Data and Information Quality. 2011;2(2) article 11.

Vinayak R. User authentication using advanced keystroke analysis. International Journal of Advance Technology in Engineering and Science. 2015;3(1).

Seham B, Mohamed B, Osman H. Keystroke authentication on enhanced needleman alignment algorithm. Intelligent Information Management. 2014; 6:211-221.

Yamane T. Statistics, An Introductory Analysis, 2nd Ed., New York: Harper and Row; 1967.

Gagbla KG. Securing E-Business Applications. Using Keystroke Dynamics as a Biometric Authentication Technique; 2005.

Gunetti D, Picardi C. Keystroke Analysis as a Tool for Intrusion Detection. Continuous authentication using biometrics: data, model, and metrics. Issa Traore: IGI Global; 2012.