Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

Jason Tortorete COSC 316

 Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and Identification  Modality  Wolf Attack  Define  Probability  Questions/Closing

 The flow of information between a subject and an object  Subject: user/program/process that requires use of an objects resources  Life imitates art  AI  “Thinking” robotics and emotional/conversational cyborgs  Minority Report  Police use holographic data screens (Microsoft and NY)  City-wide surveillance  Dimensional maps and database feeds used to monitor citizen movements  Deployment of systems allowing broad and autonomous surveillance  Protect access and resources  Biometrics as a panacea?  Research hacker reports (vulnerable)  Biometric security circumvention and fundamental constraints seem to fall on deaf ears

 Certified Information System Security Professional certification track  Convey the significance of the principle of access control  Access Control is Domain One of Ten  Represents the security industries gold standard of certification 4 functions that drive access controls  Identification - Method in which a system requests information from an entity (username)  Authentication - Often a second piece of information requested (pass or PIN)  Authorization - Permits or denies requests  Accountability – All subjects be recorded and logged The classic “who”, “what”, and “when”

 Biometrics?  Bio-living creature  Metrics-ability to measure in a quantitative manner  Context  In security: describes both characteristics and processes  Measurable traits (both behavioral and physiological)  Leverage unique identifiers for the purposes of subject identification

 Verification  Confirming or denying a subjects claimed identity  Digitized biological sample in the form of an image  Sample associated with specific identity within that system-determines all future access attempts  Verification is synonymous with one-to-one  Identification asks : “Is the requesting subject in fact who they claim to be?”  Verification asks : “Do I know who this subject is?”

 Modality or class of biometric attribute  Four major classes: (leverage biological biometrics)  Fingerprint recognition  Hand geometry recognition  Iris recognition  Facial recognition

 Fingerprint recognition:  Comprised of random ridges and valleys (islands, dots, bifurcations, and ending ridges)

 Hand geometry:  taking a three dimensional image of the hand in order to capture and compare hand structure (lacks uniqueness of fingerprint or iris)

 Facial recognition:  Leverage the uniqueness of the human face (distance between eyes, width of the nose, cheekbones, and chin)  Problems with lighting

 Iris recognition:  Uses infrared illumination (IR)  Extremely high resolution images of the iris (colored portion)  Extremely high success rate and highly effective.  Costly  All classes are best implemented with another method

 Exploitation:  Stems from the fact that biometric technology and the security it provides is probabilistic in nature.  The wolf attack uses this fact to circumvent biometric based security mechanisms by exploiting them.  Three industry recognized classifications of biometric based threats: 1) Intentional impersonation 2) Unexpectedly high FAR 3) Backdoor creation

 Why Wolf?  A wolf is an input value that that can be falsely accepted as a match with multiple templates  Wolves are fed into the system and are used to impersonate a victim and trick the system  WAP or Wolf Attack Probability is defined as a maximum success probability with one wolf sample

 What exactly a wolf attack is/does?  A created biometric sample that shows a high degree of similarity to the majority of the systems templates  Therefore, the outcome’s statistical success is not confirmed or denied by the MCP (minutiae collision probability) but instead is estimated using a WAP  Resulting in a huge increase in attack success  In other words, the systems logarithms are barraged with minutiae (all the variations and inputs possible) to comply with the existing templates

 The point:  Unlike security mechanisms, such as an open encryption standard, where someone can easily gain full knowledge of the internal workings (without that knowledge leading a comprise of the math that protects that system), biometrics do so and give the attacker a huge advantage.  Biometric security systems are the future and therefore, biometric based system attacks are as well.  Questions?

 Biometric identification systems. (2012). Retrieved from  Biometrics Identity Management Agency. (n.d.). Biometrics Identity Management Agency Overview. Retrieved November , from  CNN Money. (2012). Hackers’ next target: Your eyeballs. Retrieved from  Das, R. (2006). An introduction to biometrics A concise overview of the most important biometric technologies. Retrieved from metrics.pdf metrics.pdf  Major flaws in biometric security products. (2002). Retrieved from