Deep Learning-Based Authentication Using Keystroke-Dynamics
DOI:
https://doi.org/10.63682/jns.v14i4.7547Keywords:
CONV1D, whale optimization, firefly, enhanced wolf, gannet optimizationAbstract
Keystroke dynamics where a user is authenticated based on his/her typing patterns. It is considered as best solution to authenticate a user as this problem is solved by considering behavioural characteristics which is very difficult to copy. In this research paper we solved the problem of static keystroke dynamics by deep learning approach.in this paper we use the concept of quantile transformation which reduces the impact of outliers. For pattern reorganization, various optimization algorithms are used. For global pattern recognition various Metaheuristics algorithms and for local pattern ADAM optimization algorithm is used. The best solution is achieved by the Firefly Optimization Algorithm (a nature-inspired, swarm-based metaheuristic) which excels at global pattern reorganization by using bioluminescent-based attraction. Here, less-optimal solutions are drawn toward better ones through intensity-based movements, with attractiveness decreasing over distance. This mechanism enables efficient exploration of the search space and helps locate the best solution.
Downloads
Metrics
References
Shadman, R., Wahab, A. A., Manno, M., Lukaszewski, M., Hou, D., & Hussain, F. (2023). Keystroke dynamics: Concepts, techniques, and applications. ACM Computing Surveys.
Roy, S., Pradhan, J., Kumar, A., Adhikary, D. R. D., Roy, U., Sinha, D., & Pal, R. K. (2022). A systematic literature review on latest keystroke dynamics based models. IEEE Access, 10, 92192-92236.
Kasprowski, P., Borowska, Z., & Harezlak, K. (2022). Biometric identification based on keystroke dynamics. Sensors, 22(9), 3158.
Soni, J., & Prabakar, N. (2021, December). KeyNet: enhancing cybersecurity with deep learning-based LSTM on keystroke dynamics for authentication. In International Conference on Intelligent Human Computer Interaction (pp. 761-771). Cham: Springer International Publishing.
Risto, H. N., Bos, S., & Graven, O. H. (2024, December). Keystroke Dynamics Authentication with MLP, CNN, and LSTM on a Fixed-Text Data Set. In 2024 8th Cyber Security in Networking Conference (CSNet) (pp. 76-82). IEEE.
Malinowski, M., & Krawczyk-Borysiak, Z. (2024). Recognizing User Emotion Based on Keystroke Dynamics. Przegląd Elektrotechniczny, (6).
Shekhawat, K., & Bhatt, D. P. (2022). Machine learning techniques for keystroke dynamics. In Proceedings of Data Analytics and Management: ICDAM 2021, Volume 2 (pp. 217-227). Springer Singapore.
Wang, X., & Hou, D. (2024). Enhancing Keystroke Dynamics Authentication with Ensemble Learning and Data Resampling Techniques. Electronics, 13(22), 4559.
Kamra, A., Khurana, S., & Goel, A. (2025, March). Keystroke Dynamics Based User Authentication Focusing on Fixed Text Approaches. In 2025 3rd International Conference on Device Intelligence, Computing and Communication Technologies (DICCT) (pp. 427-432). IEEE.
Amin, S., & Di Iorio, C. (2025). A Review of Several Keystroke Dynamics Methods. arXiv preprint arXiv:2502.16177.
Ali, M. L., Thakur, K., & Obaidat, M. A. (2022). A hybrid method for keystroke biometric user identification. Electronics, 11(17), 2782.
Monrose, F., & Rubin, A. D. (2000). Keystroke dynamics as a biometric for authentication. Future Generation computer systems, 16(4), 351-359.
Altwaijry, N. (2023). Authentication by keystroke dynamics: The influence of typing language. Applied Sciences, 13(20), 11478.
Medvedev, V., Budžys, A., & Kurasova, O. (2025). A decision-making framework for user authentication using keystroke dynamics. Computers & Security, 104494.
Chang, H. C. (2021). Keystroke dynamics based on machine learning.
Bhasin, N., & Tarar, S. (2021). Three-layer authentication in keystroke dynamics using time based tool. In Journal of Physics: Conference Series (Vol. 1714, No. 1, p. 012030). IOP Publishing.
Budžys, A., Kurasova, O., & Medvedev, V. (2025). Integrating deep learning and data fusion for advanced keystroke dynamics authentication. Computer Standards & Interfaces, 92, 103931.
Brekke, S., & Bours, P. (2024, November). Continuous Age Detection using Keystroke Dynamics. In Norsk IKT-konferanse for forskning og utdanning (No. 3).
PUTRA, S. R., & CHOWANDA, A. (2025). KEYSTROKE DYNAMICS ON MULTI-SESSION AND UNCONTROLLED SETTINGS USING CNN BI-LSTM. Journal of Theoretical and Applied Information Technology, 103(2).
Bhasin, N., Sharma, S. K., & Mishra, R. (2025). Keystroke dynamics and quantum machine learning. International Journal of Biometrics, 17(1-2), 132-150.
Piugie, Y. B. W., Di Manno, J., Rosenberger, C., & Charrier, C. (2022, September). Keystroke dynamics based user authentication using deep learning neural networks. In 2022 International Conference on Cyberworlds (CW) (pp. 220-227). IEEE.
Kevin S. Killourhy and Roy A. Maxion. "Comparing Anomaly Detectors for Keystroke Dynamics," in Proceedings of the 39th Annual International Conference on Dependable Systems and Networks (DSN-2009), pages 125-134, Estoril, Lisbon, Portugal, June 29-July 2, 2009. IEEE Computer Society Press, Los Alamitos, California, 2009.
AbdelRaouf, H., Chelloug, S. A., Muthanna, A., Semary, N., Amin, K., & Ibrahim, M. (2023). Efficient convolutional neural network-based keystroke dynamics for boosting user authentication. Sensors, 23(10), 4898.
O'shea, K., & Nash, R. (2015). An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458.
Kingma, D. P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.
Pan, J. S., Zhang, L. G., Wang, R. B., Snášel, V., & Chu, S. C. (2022). Gannet optimization algorithm: A new metaheuristic algorithm for solving engineering optimization problems. Mathematics and Computers in Simulation, 202, 343-373.
Johari, N. F., Zain, A. M., Noorfa, M. H., & Udin, A. (2013). Firefly algorithm for optimization problem. Applied Mechanics and Materials, 421, 512-517.
Mirjalili, S., & Lewis, A. (2016). The whale optimization algorithm. Advances in engineering software, 95, 51-67.
Hou, Y., Gao, H., Wang, Z., & Du, C. (2022). Improved grey wolf optimization algorithm and application. Sensors, 22(10), 3810.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.