Journal of Cyber Security and Risk Auditing

Journal of Cyber Security and Risk Auditing

ISSN: 3079-5354 (Online)

Publishing model:

: Open access
open accessOpen Access

Article

👁️2views

Student Identity Fraud Detection in Online Exams Using Keystroke Dynamics: A Comparative Study of Classical Machine Learning and Deep Learning Models

by 

Khadija Alhumaid Orcid link

PDF logoPDF

Published: 2026/31/03

Abstract

The process of conducting online examinations has created a new security threat which allows students to use their authentic identity verification systems to impersonate others for assessment completion. The paper presents an identity verification system which uses keystroke dynamics as its core mechanism. The approach creates a biometric typing signature by analyzing password typing through latency and hold-time features. A benchmark study is conducted using the CMU Keystroke Dynamics dataset (DSL-StrongPasswordData). The researchers trained multiple classical Machine Learning (ML) models and Deep Learning (DL) architectures to identify multiple student groups while measuring their performance with Accuracy, Precision, Recall, F1-score, and ROC curves. The classical ML methods achieved better results than DL methods when tested on the tabular behavioral biometric dataset. The Random Forest model achieves the best performance with Accuracy = 94.07%, Precision = 94.22%, Recall = 94.07%, and F1 = 94.03%. The results demonstrate that recurrent architectures outperformed convolutional architectures because BiGRU achieved an accuracy of 88.14%. Advanced visualization techniques enable users to see how identity similarity patterns and behavioral drift and fraud risk separation exist in the data. The findings support the deployment of keystroke-based authentication as a low-cost additional security layer for academic integrity in remote proctored examinations.

Keywords

Academic integritybiometricsdeep learningkeystroke dynamicsmachine learningonline examsand student identity fraud.

References

  1. S. Al-Tamimi and Q. A. Al-Haija, “Security and privacy of educational computational intelligence,” in Internet of Behavior-Based Computational Intelligence for Smart Education Systems, IGI Global Scientific Publishing, 2025, pp. 301–328.
  2. S. A. Salloum, C. Mhamdi, B. Al Kurdi, and K. Shaalan, “Factors affecting the Adoption and Meaningful Use of Social Media: A Structural Equation Modeling Approach,” Int. J. Inf. Technol. Lang. Stud., vol. 2, no. 3, pp. 96–109, 2018.
  3. J. Heil and D. Ifenthaler, “Online Assessment in Higher Education: A Systematic Review.,” Online Learn., vol. 27, no. 1, pp. 187–218, 2023.
  4. S. Salloum, T. Gaber, S. Vadera, and K. Shaalan, “Phishing Email Detection Using Natural Language Processing Techniques: A Literature Survey,” Procedia Comput. Sci., vol. 189, pp. 19–28, 2021.
  5. S. Salloum, T. Gaber, S. Vadera, and K. Sharan, “A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques,” IEEE Access, 2022.
  6. P. Dawson, Defending assessment security in a digital world: Preventing e-cheating and supporting academic integrity in higher education. Routledge, 2020.
  7. R. Al-Maroof et al., “Students’ perception towards using electronic feedback after the pandemic: Post-acceptance study,” Int. J. Data Netw. Sci., vol. 6, no. 4, pp. 1233–1248, 2022.
  8. G. Akçapınar, “Detecting AI-Assisted Cheating in Online Exams through Behavior Analytics,” arXiv Prepr. arXiv2510.18881, 2025.
  9. K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” in 2009 IEEE/IFIP international conference on dependable systems & networks, 2009, pp. 125–134.
  10. S. AlTamimi, Q. A. Al-Haija, and A. AlShuaibi, “Gamification in Cybersecurity Education: Insights, Challenges, and Emerging Solutions,” in 2025 IEEE 16th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2025, pp. 526–532.
  11. S. S. Abba, O. A. Obioha-Val, V. O. Ejiofor, O. M. Olaniyi, and N. R. Mayeke, “Behavioral Biometrics-Powered Continuous Authentication for Zero-trust Remote Work Environments: A Multi-factor Identity Verification Framework,” Asian J. Res. Comput. Sci., vol. 18, no. 12, pp. 20–41, 2025.
  12. S. Salturk, T. E. Pamukcu, and N. Kahraman, “Contactless biometric verification from in-air signatures using deep siamese networks,” Sci. Rep., vol. 16, no. 1, p. 130, 2026.
  13. R. Shadman, A. A. Wahab, M. Manno, M. Lukaszewski, D. Hou, and F. Hussain, “Keystroke dynamics: Concepts, techniques, and applications,” ACM Comput. Surv., vol. 57, no. 11, pp. 1–35, 2025.
  14. A. Agrawal, “Human Behavior-Based Keystroke Password Authentication: A Behavioral Biometrics Approach,” Explor. Intersect. Forensics Biometrics, pp. 61–82, 2026.
  15. R. Giot, M. El-Abed, and C. Rosenberger, “Keystroke dynamics authentication for collaborative systems,” in 2009 International Symposium on Collaborative Technologies and Systems, 2009, pp. 172–179.
  16. P. S. Teh, A. B. J. Teoh, and S. Yue, “A survey of keystroke dynamics biometrics,” Sci. World J., vol. 2013, no. 1, p. 408280, 2013.
  17. T. Sing, O. Sander, N. Beerenwinkel, and T. Lengauer, “ROCR: visualizing classifier performance in R,” Bioinformatics, vol. 21, no. 20, pp. 3940–3941, 2005.
  18. R. Mattsson, “Keystroke dynamics for student authentication in online examinations.” 2020.
  19. S. F. N. Sadikan, A. A. Ramli, and M. F. M. Fudzee, “A survey paper on keystroke dynamics authentication for current applications,” in AIP conference proceedings, 2019, vol. 2173, no. 1, p. 20010.
  20. S. Al Tamimi, “Towards Beyond Technology: Reviewing Human Error (HE) as the Primary Reason of Cyber Security Breaches,” in 2025 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA), 2025, pp. 1–6.
  21. X. Lu, S. Zhang, P. Hui, and P. Lio, “Continuous authentication by free-text keystroke based on CNN and RNN,” Comput. Secur., vol. 96, p. 101861, 2020.
  22. E. A. Kochegurova and R. P. Zateev, “Hidden monitoring based on keystroke dynamics in online examination system,” Program. Comput. Softw., vol. 48, no. 6, pp. 385–398, 2022.
  23. Y. Shi, X. Wang, K. Zheng, and S. Cao, “User authentication method based on keystroke dynamics and mouse dynamics using HDA,” Multimed. Syst., vol. 29, no. 2, pp. 653–668, 2023.
  24. X. Wang, Y. Shi, K. Zheng, Y. Zhang, W. Hong, and S. Cao, “User authentication method based on keystroke dynamics and mouse dynamics with scene-irrelated features in hybrid scenes,” Sensors, vol. 22, no. 17, p. 6627, 2022.
  25. Kevin, “Keystroke Dynamics - Benchmark Data Set,” 2009. https://www.cs.cmu.edu/~keystroke/?utm_source=chatgpt.com.
  26. T. Dias, J. Vitorino, E. Maia, O. Sousa, and I. Praça, “KeyRecs: A keystroke dynamics and typing pattern recognition dataset,” Data Br., vol. 50, p. 109509, 2023.
  27. N. González and E. Calot, “Dataset of human-written and synthesized samples of free-text keystroke dynamics to evaluate liveness detection methods,” Mendeley Data, vol. 2, p. 2022, 2022.
  28. F. Hussain, “IoT Healthcare Security Dataset,” Kaggle, 2023. https://www.kaggle.com/datasets/faisalmalik/iot-healthcare-security-dataset.
  29. A. Ibrahim, A. F. Kadhim, A. E. Hamzah, and M. A. Al-Shareeda, “A secure and scalable IoT home automation architecture with web and biometric control,” International Journal of Cybersecurity Engineering and Innovation, vol. 2026, no. 1, 2026.
  30. M. Alshinwan, A. G. Memon, M. C. Ghanem, and M. Almaayah, “Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering,” Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 27–36, 2025. doi: 10.63180/jjic.thestap.2025.1.4.
  31. R. Almarshood and M. M. H. Rahman, “Enhancing Intrusion Detection Systems by Using Machine Learning in Smart Cities: Issues, Challenges and Future Research Direction,” STAP Journal of Security Risk Management, vol. 2025, no. 1, pp. 3–21, 2025, doi: 10.63180/jsrm.thestap.2025.1.1.
  32. S. Alsahaim, M. A. Almaiah, and R. B. Sulaiman, “Security threats in mobile phones: Challenges, countermeasures, and the importance of user awareness,” International Journal of Cybersecurity Engineering and Innovation, vol. 2023, no. 1, 2023.