Deep Learning-Based Authentication Using Keystroke-Dynamics

Authors

  • Namisha Bhasin
  • Sanjay Kumar Sharma
  • Rajesh Mishra

DOI:

https://doi.org/10.63682/jns.v14i4.7547

Keywords:

CONV1D, whale optimization, firefly, enhanced wolf, gannet optimization

Abstract

Keystroke dynamics where a user is authenticated based on his/her typing patterns. It is considered as best solution to authenticate a user as this problem is solved by considering behavioural characteristics which is very difficult to copy. In this research paper we solved the problem of static keystroke dynamics by deep learning approach.in this paper we use the concept of quantile transformation which reduces the impact of outliers. For pattern reorganization, various optimization algorithms are used. For global pattern recognition various  Metaheuristics algorithms and  for local pattern ADAM optimization algorithm is used. The best solution is achieved by the Firefly Optimization Algorithm (a nature-inspired, swarm-based metaheuristic) which excels at global pattern reorganization by using bioluminescent-based attraction. Here, less-optimal solutions are drawn toward better ones through intensity-based movements, with attractiveness decreasing over distance. This mechanism enables efficient exploration of the search space and helps locate the best solution.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Shadman, R., Wahab, A. A., Manno, M., Lukaszewski, M., Hou, D., & Hussain, F. (2023). Keystroke dynamics: Concepts, techniques, and applications. ACM Computing Surveys.

Roy, S., Pradhan, J., Kumar, A., Adhikary, D. R. D., Roy, U., Sinha, D., & Pal, R. K. (2022). A systematic literature review on latest keystroke dynamics based models. IEEE Access, 10, 92192-92236.

Kasprowski, P., Borowska, Z., & Harezlak, K. (2022). Biometric identification based on keystroke dynamics. Sensors, 22(9), 3158.

Soni, J., & Prabakar, N. (2021, December). KeyNet: enhancing cybersecurity with deep learning-based LSTM on keystroke dynamics for authentication. In International Conference on Intelligent Human Computer Interaction (pp. 761-771). Cham: Springer International Publishing.

Risto, H. N., Bos, S., & Graven, O. H. (2024, December). Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set. In 2024 8th Cyber Security in Networking Conference (CSNet) (pp. 76-82). IEEE.

Malinowski, M., & Krawczyk-Borysiak, Z. (2024). Recognizing User Emotion Based on Keystroke Dynamics. Przegląd Elektrotechniczny, (6).

Shekhawat, K., & Bhatt, D. P. (2022). Machine learning techniques for keystroke dynamics. In Proceedings of Data Analytics and Management: ICDAM 2021, Volume 2 (pp. 217-227). Springer Singapore.

Wang, X., & Hou, D. (2024). Enhancing Keystroke Dynamics Authentication with Ensemble Learning and Data Resampling Techniques. Electronics, 13(22), 4559.

Kamra, A., Khurana, S., & Goel, A. (2025, March). Keystroke Dynamics Based User Authentication Focusing on Fixed Text Approaches. In 2025 3rd International Conference on Device Intelligence, Computing and Communication Technologies (DICCT) (pp. 427-432). IEEE.

Amin, S., & Di Iorio, C. (2025). A Review of Several Keystroke Dynamics Methods. arXiv preprint arXiv:2502.16177.

Ali, M. L., Thakur, K., & Obaidat, M. A. (2022). A hybrid method for keystroke biometric user identification. Electronics, 11(17), 2782.

Monrose, F., & Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future Generation computer systems, 16(4), 351-359.

Altwaijry, N. (2023). Authentication by keystroke dynamics: The influence of typing language. Applied Sciences, 13(20), 11478.

Medvedev, V., Budžys, A., & Kurasova, O. (2025). A decision-making framework for user authentication using keystroke dynamics. Computers & Security, 104494.

Chang, H. C. (2021). Keystroke dynamics based on machine learning.

Bhasin, N., & Tarar, S. (2021). Three-layer authentication in keystroke dynamics using time based tool. In Journal of Physics: Conference Series (Vol. 1714, No. 1, p. 012030). IOP Publishing.

Budžys, A., Kurasova, O., & Medvedev, V. (2025). Integrating deep learning and data fusion for advanced keystroke dynamics authentication. Computer Standards & Interfaces, 92, 103931.

Brekke, S., & Bours, P. (2024, November). Continuous Age Detection using Keystroke Dynamics. In Norsk IKT-konferanse for forskning og utdanning (No. 3).

PUTRA, S. R., & CHOWANDA, A. (2025). KEYSTROKE DYNAMICS ON MULTI-SESSION AND UNCONTROLLED SETTINGS USING CNN BI-LSTM. Journal of Theoretical and Applied Information Technology, 103(2).

Bhasin, N., Sharma, S. K., & Mishra, R. (2025). Keystroke dynamics and quantum machine learning. International Journal of Biometrics, 17(1-2), 132-150.

Piugie, Y. B. W., Di Manno, J., Rosenberger, C., & Charrier, C. (2022, September). Keystroke dynamics based user authentication using deep learning neural networks. In 2022 International Conference on Cyberworlds (CW) (pp. 220-227). IEEE.

Kevin S. Killourhy and Roy A. Maxion. "Comparing Anomaly Detectors for Keystroke Dynamics," in Proceedings of the 39th Annual International Conference on Dependable Systems and Networks (DSN-2009), pages 125-134, Estoril, Lisbon, Portugal, June 29-July 2, 2009. IEEE Computer Society Press, Los Alamitos, California, 2009.

AbdelRaouf, H., Chelloug, S. A., Muthanna, A., Semary, N., Amin, K., & Ibrahim, M. (2023). Efficient convolutional neural network-based keystroke dynamics for boosting user authentication. Sensors, 23(10), 4898.

O'shea, K., & Nash, R. (2015). An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458.

Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.

Pan, J. S., Zhang, L. G., Wang, R. B., Snášel, V., & Chu, S. C. (2022). Gannet optimization algorithm: A new metaheuristic algorithm for solving engineering optimization problems. Mathematics and Computers in Simulation, 202, 343-373.

Johari, N. F., Zain, A. M., Noorfa, M. H., & Udin, A. (2013). Firefly algorithm for optimization problem. Applied Mechanics and Materials, 421, 512-517.

Mirjalili, S., & Lewis, A. (2016). The whale optimization algorithm. Advances in engineering software, 95, 51-67.

Hou, Y., Gao, H., Wang, Z., & Du, C. (2022). Improved grey wolf optimization algorithm and application. Sensors, 22(10), 3810.

Downloads

Published

2025-06-20

How to Cite

1.
Bhasin N, Sharma SK, Mishra R. Deep Learning-Based Authentication Using Keystroke-Dynamics. J Neonatal Surg [Internet]. 2025Jun.20 [cited 2025Jul.17];14(4):524-35. Available from: https://jneonatalsurg.com/index.php/jns/article/view/7547