Intruder Detection on Mobile Phones Using Keystroke Dynamic and Application Usage Patterns

  • Chapter
  • First Online:
Advances in Diagnostics of Processes and Systems

Abstract

Security through biometric keystroke and user action analysis on mobile phones is a new approach. Most of the existing solutions track only GPS location, which allows detecting theft. None of them support spy detection or short access of the intruder when the phone is away from its owner. In this paper, Authors present a solution that allows detecting intruder via analysis of typical user’s actions in the applications and way of writing - keystroke dynamics. Presented solutions can be run as an application on Android mobile devices and currently is distributed via Google Play Store alpha channel for testing by the limited number of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. comScore.: https://www.comscore.com/. Last accessed 12 Dec 2019

  2. AdMob serves a billion.: http://www.mobileent.biz. Last accessed 15 Dec 2019

  3. Lysik, L., Machura, P.: The role and importance of mobile technology in everyday life of the 21st century (in Polish). http://www.mediaispoleczenstwo.ath.bielsko.pl/art/04_lysik_machura.pdf. Last accessed 30 Dec 2019

  4. Kedziora, M., Gawin, P., Szczepanik, M., Jóźwiak, I.: Malware detection using machine learning algorithms and reverse engineering of Android Java Code. (2019). https://doi.org/10.5121/ijnsa.2019.11101

    Article  Google Scholar 

  5. Szczepanik, M., Jóźwiak, I.: Fingerprint recognition based on minutes groups using directing attention algorithms. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds) Artificial Intelligence and Soft Computing. ICAISC 2012. Lecture Notes in Computer Science, vol. 7268. Springer, Berlin, Heidelberg (2012)

    Google Scholar 

  6. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comp. Syst. 16, 351–359 (2000)

    Article  Google Scholar 

  7. **, M., He, Y., Fang, D., Chen, X., Meng, X., **ng, T.: iGuard: A real-time anti-theft system for smartphones. In: IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, pp. 1-9 (2017). https://doi.org/10.1109/INFOCOM.2017.8057021

  8. Prey Project.: https://preyproject.com/. Last accessed 18 Dec 2019

  9. Cerberus.: https://www.cerberusapp.com/. Last accessed 18 Dec 2019

  10. Szczepanik, M., Jóźwiak, I.J., Jamka, T., Stasiński, K.: Security lock system for mobile devices based on fingerprint recognition algorithm. In: Światek, J., Borzemski, L., Grzech, A., Wilimowska, Z. (eds) Proceedings of 36th International Conference on Information Systems Architecture and Technology—ISAT 2015—Part III. Advances in Intelligent Systems and Computing, vol. 431. Springer, Cham (2016)

    Google Scholar 

  11. Deng, Y., Zhong, Y.: Keystroke dynamics advances for mobile devices using deep neural network in Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 59–70 (2015)

    Google Scholar 

  12. Maiorana, E., Campisi, P., González-Carballo, N., Neri, A.: Keystroke dynamics authentication for mobile phones. In: Proceedings of the ACM Symposium on Applied Computing, vol. 21–26 (2011). https://doi.org/10.1145/1982185.1982190

  13. Lee, H., Hwang, J.Y., Kim, D.I., Lee, S., Lee, S.H., Shin, J.S.: Understanding Keystroke Dynamics for Smartphone Users Authentication and Key-stroke Dynamics on Smartphones Built-In Motion Sensors. Secur. Commun. Netw. 2018(2567463), 10 (2018)

    Google Scholar 

  14. Alshanketi, F., Traoré, I., Awad, A.: Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords. Secur. Privacy 2, e48 (2019)

    Article  Google Scholar 

  15. Shahzad, F.: Low-cost intruder detection and alert system using mobile phone proximity sensor. In: 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), pp. 1–5. Karachi (2017)

    Google Scholar 

  16. Jiang, C.H.: Keystroke statistical learning model for web authentication. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.314.1573&rep=rep1&type=pdf. Last accessed 30 Dec 2019

  17. Shen, S., Lin, S., Kang, T., Chien, W.: Enhanced keystroke dynamics authentication utilizing pressure detection. In: 2016 International Conference on Applied System In-novation (ICASI), pp. 1–4. Okinawa (2016). https://doi.org/10.1109/ICASI.2016.7539947

  18. Trojahn, M.: Biometric authentication through a virtual keyboard for smartphones. Int. J. Comput. Sci. Inf. Technol. 4, 1–12 (2012)

    Google Scholar 

  19. TensorFlow Lite.: https://www.tensorflow.org/lite. Last accessed 12 Dec 2019

  20. Spydetector.: https://play.google.com/store/apps/details?id=com.apartapps.spydetector. Last accessed 30 Dec 2019 (restricted for alpha channel users)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Szczepanik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Szczepanik, M., Jóźwiak, I. (2021). Intruder Detection on Mobile Phones Using Keystroke Dynamic and Application Usage Patterns. In: Korbicz, J., Patan, K., Luzar, M. (eds) Advances in Diagnostics of Processes and Systems. Studies in Systems, Decision and Control, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-030-58964-6_11

Download citation

Publish with us

Policies and ethics

Navigation