November 2019
Intermediate to advanced
346 pages
9h 36m
English
Analyzing keystroke dynamics utilizes the rhythm and pace at which a user types on a keyboard to verify that individual's identity. We begin by setting up some baselines. In step 1 and step 2, we set up the keystroke dynamics system to learn the typing pattern of the first user. We then do the same for the second user (step 3). This establishes our normal users, as well as their typing patterns. In step 4 and step 5, we utilize our trained model (trained in steps 1-3), to determine who the current user is. As you can see, the classifier outputs a similarity score and a prediction of who the current user is from its catalog of saved users. This allows us to detect unauthorized users, as well as to simply keep track of system ...