Computer-User-Input Behavioral Biometrics Dr. Charles C

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Thumbs Up for Security Thumbs Up for Security Overview Dr. Charles Tappert (
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
2015 GenCyber Cybersecurity Workshop Mobile Phone SecurityJuly 10, 2015 Design and User Acceptability Testing of Secure Mobile Phone Authentication Mechanism.
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
SUBTITLE 2015 GenCyber Cybersecurity Workshop In-class Exercise: Components of Cybersecurity Andreea Cotoranu, Vinnie Monaco, and Chuck Tappert Seidenberg.
Multi Touch Screen Yong Du Ayyappan Iyer. Multi Touch Screen.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Numerical Methods Continuous Fourier Series Part: Continuous Fourier Series
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Today’s Session Introduction Overview of Biometrics Dr. Charles C
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
IT Security Awareness Day October 19, 2016
Adil Tugyan MIE.
A device tat transfers data from the outside world into a computer
Introduction to Information and Communication Technologies
Your Personal Protection & Safety Smartphone App
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
System Software EIT, © Author Gay Robertson, 2016.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
GCSE COMPUTER SCIENCE Topic 4 - Computers
Authentication.
Software Design and Architecture
Doctor of Professional Studies Orientation
Numerical Methods Multi Dimensional Direct Search Methods - Example
Chapter 5 - Input.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Chapter 2: Input and output devices
Keystroke Biometric Authentication on Smartphones Using Short Numeric Input Greg: Our project covers the topic of Keystroke Biometric Authentication, which.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Web 2.0 Technologies and Community Building Online by
Elliptic Partial Differential Equations – Direct Method
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
CS691-CS692-IT691 Capstone Projects Course
What is Input "Any data or instruction that is entered into a computer is called input". This data or instruction can come directly from end user or.
Elliptic Partial Differential Equations – Gauss-Seidel Method
ICT Word Processing Lesson 5: Revising and Collaborating on Documents
Computer Basics.
Numerical Methods Golden Section Search Method - Example
Numerical Methods Newton’s Method for One -Dimensional Optimization - Example
TEAM 2 EMERGING INFORMATION TECHNOLOGIES I
Seidenberg’s Key Areas of Expertise
CS691-CS692-IT691 Capstone Projects Course
Human and Computer Interaction (H.C.I.) &Communication Skills
Object-Oriented Programming (OOPs)
Doctor of Professional Studies Orientation Revisited
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
MIS 5302 Managing Technology and Systems Week 4
CS691-CS692-IT691 Capstone Projects Course
DIGITAL CLASSROOM ICT Enhanced Teaching-Learning
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Computer-User-Input Behavioral Biometrics Dr. Charles C Computer-User-Input Behavioral Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University http://csis.pace.edu/~ctappert/ Subtitle GenCyber Cybersecurity Workshop at Pace University

What are Computer-User-Input Behavioral Biometrics Authentication or identification of individuals based on the unique way they interact with computer devices With desktop/laptop computers, it is the way people input text (motor control of keystroke input), the words and syntax they use (stylometry), the intent (semantics) of the input, as well as the way they move a mouse With smartphones, and to some extent tablets, it concerns all of the above, and everything from how the user holds the phone to how they swipe the screen to which keyboard or gestural shortcuts they use These biometrics are the ones we focus on at Pace University because they have not been as extensively studied as the well-known biometrics

Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users DARPA: Active Authentication – DoD wants to continually authenticate all gov’t computer users Phase 1: 2010 and 2012 – authenticate users on desktops/laptops Phase 2: 2013 and 2015 – authenticate users on mobile devices Phase 3: 2016 - implementation DARPA: Enhanced Attribution – DoD wants technology to attribute actions in cyberspace to individuals 2016-2020 – network behavior and activity tracking of individuals, fusing generated data for predictive analysis

Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users U.S. Higher Education Opportunity Act of 2008 Concerns authentication of students taking online tests Universities are using more online courses Requires institutions of higher learning to adopt new identification technologies as they become available To assure students of record are those accessing the systems and taking the exams in online courses

Attribution and Intrusion Detection Plan Multi-biometric System Motor control level – keystroke + mouse movement Linguistic level – stylometry (char, word, syntax) Semantic level – target likely intruder commands Intruder Keystroke + Mouse Stylometry Motor Control Level Linguistic Semantic

Keystroke Biometrics Based on idea that generated patterns are unique to individuals and difficult to duplicate Appeal of keystroke over other biometrics Not intrusive, inexpensive, continual user verification The keystroke biometric is one of the less-studied behavioral biometrics

Pace Univ. Keystroke Biometric Studies Most literature studies have been on short input of a few seconds Commercial products on hardening passwords Pace University studies on desktop/laptop mechanical keyboards Short input of few seconds Vinnie Monaco, now at ARL, entered 2016 contest: we have World’s Best System Phone number – similar to CMU study (Ned Bakelman and Vinnie Monaco) Long text input of several minutes Online test taking (Mary Villani, John Stewart, Vinnie Monaco, Steve Kim) Impaired users – left hand, right hand, and both hands input (Gonzalo Perez) Pace University studies on mobile device touchscreens Numeric input – phone # – similar to CMU study (Mike Coakley) Features – pressure & location/area of finger press on keys, acceleration & gyroscope information Names are doctoral students

Mouse Movement and Stylometry Traits

Pace Univ. Mouse & Stylometry Studies Combining keystroke/stylometry info: John Stewart Stylometry can compliment keystroke analysis The correct student may be keying in the test answers provided by a coach, with the student merely typing the coach’s words This would not be discovered via keystroke analysis But potentially could through stylometry analysis Stylometry analysis of Facebook postings Dissertation study by Jenny Li

Interesting Related Videos IBM Trusteer Car Driving Biometric (2 min) IBM Watson future (2 min) IBM Watson (8 min) IBM Watson robot (51 min) IBM CEO Ginni Rometty (28 min) A View of the Future of CyberSecurity – RSA Conf 2017 (2 min) Google's Great AI Awakening – RSA Conf 2017 (40 min) Other RSA Conf 2017 videos RSA Amazon CEO Jeff Bezos (80 min) Another keystroke biometric demo

Sources of Dissertations and Papers Research Day Conference Proceedings 2017 Research Day Conference – stylometry examples below The Correlation between the Topic and Emotion of Tweets through Machine Learning Three Topics: Politics, Religion, Family Three Emotions: Happiness, Sadness, Anger Sentiment Analysis of Twitter Messages Using Word2Vec Classify tweets as displaying positive, negative, or neutral sentiment Doctoral of Professional Studies (DPS) program DPS Doctoral Dissertations.

Copyright for Material Reuse This materials are developed under the support of the GenCyber program of the National Security Agency and the CyberCorps program of the National Science Foundation. Copyright© 2017 Charles Tappert (ctappert@pace.edu), Pace University. Please properly acknowledge the source for any reuse of the materials as below. Charles Tappert, 2017 GenCyber Cybersecurity Workshop, Pace University Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation. A copy of the license is available at http://www.gnu.org/copyleft/fdl.html.

Acknowledgment The authors would like to acknowledge the support from the GenCyber program of the National Security Agency and the CyberCorps program of the National Science Foundation. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, the National Security Agency or the U.S. government.