Dhaka University Repository

Securing Graphical Authentication Using Keystroke Dynamics

Show simple item record

dc.contributor.author Roy, Indrani
dc.date.accessioned 2026-03-03T07:45:46Z
dc.date.available 2026-03-03T07:45:46Z
dc.date.issued 2026-03-03
dc.identifier.uri http://reposit.library.du.ac.bd:8080/xmlui/xmlui/handle/123456789/4795
dc.description This thesis is submitted for the degree of Master of Philosophy. en_US
dc.description.abstract Account recovery is a critical aspect of web application security, often overlooked despite its importance. Traditional account recovery methods, such as sending a password reset link or a new username to the user’s registered email, are vulnerable to impostors who may have access to the user’s email and other credentials. This vulnerability makes account recovery a potential weak point in the overall security of a web application. Recent applications of behavioral biometrics, such as keystroke dynamics, for attack detection and user authentication bear similarities to biometric authentication. Adding keystroke dynamics analysis to the account recovery process significantly increases the difficulty for an impostor to successfully recover and take over a user’s account. To enhance user authentication effectiveness and raise account recovery requirements through keystroke dynamics, this study adds one additional measure of keystroke patterns to the already-existing features. Compared to other access control systems based on biometric features like face or fingerprint, keystroke analysis has attained a respectable level of accuracy. In this aim, this study uses experimental data and statistical analysis to show how the unique keystroke measure provided may be utilized in conjunction with the current authentication mechanism to greatly improve the authentication and security of sensitive applications. It may be beneficial to recognize the intruders and expel them from the system as long as this job can accommodate their typing rhythm. In this study, generative adversarial networks (GAN) are utilized to generate keyboard dynamics data with a focus on impersonating a user at the identification step in both fixed text and fixed sentence contexts. Three distinct architectures have been devised, implemented, and validated with the aid of machine learning and deep learning: vanilla-GAN based on simple neural networks NN, LSTM-GAN based on recurrent neural networks using long short-term memories (LSTM), CNN-GAN based on convolutional neural networks. The developed Conditional Generative Adversarial Networks have shown that these architectures can successfully replicate a user’s keystroke dynamics by learning about the user’s typing style and generating keyboard dynamics data using different GANs with different architectural styles. Findings show that keystroke dynamics patterns can be efficiently produced by the GAN and utilized to trick keystroke authentication systems. en_US
dc.language.iso en en_US
dc.publisher © University of Dhaka en_US
dc.title Securing Graphical Authentication Using Keystroke Dynamics en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account