Keystroke Biometric Studies

Slides:



Advertisements
Similar presentations
The Robert Gordon University School of Engineering Dr. Mohamed Amish
Advertisements

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Dissemination and Critical Evaluation of Published Research Peg Bottjen, MPA, MT(ASCP)SC.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Click to highlight each section of the article one by one Read the section, then click once to view the description of it If you want to read it, you.
Click to highlight each section of the article one by one Read the section, then click once to view the description of it If you want to read it, you.
Left click or use the forward arrows to advance through the PowerPoint Upon clicking, each section of the article will be highlighted one by one Read.
Topics Covered Abstract Headings/Subheadings Introduction/Literature Review Methods Goal Discussion Hypothesis References.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
Left click or use the forward arrows to advance through the PowerPoint Upon clicking, each section of the article will be highlighted one by one Read.
DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Evaluating a Research Report
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Review of Literature Announcement: Today’s class location has been rescheduled to TEC 112 Next Week: Bring four questions (15 copies) to share with your.
Left click or use the forward arrows to advance through the PowerPoint Upon advancing, each section of the article will be highlighted one by one Read.
Reading and Evaluating Research KINE 5300 Research Methods Dr. Joel T. Cramer CSCS,*D; NSCA-CPT,*D; ACSM H/FI Assistant Professor Department of Kinesiology.
Experimental Research Methods in Language Learning Chapter 16 Experimental Research Proposals.
Assumes that events are governed by some lawful order
The Research Paper Due: November 1 st. This information can be obtained online at
What is Science?. Competency Goal 1: The learner will design and conduct investigations to demonstrate an understanding of scientific inquiry.. –1.03.
Science Fair Project Title Problem Statement Hypothesis.
This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display, including.
Report Writing Lecturer: Mrs Shadha Abbas جامعة كربلاء كلية العلوم الطبية التطبيقية قسم الصحة البيئية University of Kerbala College of Applied Medical.
Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Introduction to Survey Research
Using Hand Gestures for Alternative User Verification
Introduction to Marketing Research
Nancy Swisher Lecturer in ESL FLE 402 Fall 2016
Computer-User-Input Behavioral Biometrics Dr. Charles C
Review of Related Literature
Introduction to Quantitative Research
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
3 Research Design Formulation
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Searching the Literature
AN INTRODUCTION TO EDUCATIONAL RESEARCH.
Instructions Dear author(s),
The Steps into creation of research
PSYCH 610 Competitive Success/snaptutorial.com
PSYCH 610 Education for Service/snaptutorial.com.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Data collection with Internet
The Starting Point: Asking Questions
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
A SEMINAR REPORT ON BIOMETRICS
Dynamic Authentication of Typing Patterns
Chapter Two: Review of the Literature
REFERENCES AND ACKNOWLEDGEMENTS
Constraint in Research + Reading
Data collection with Internet
Chapter Two: Review of the Literature
Data collection with Internet
Data collection with Internet
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed keystroke biometric system for long-text input, identification/authentication performance, two independent variables – keyboard type/input mode, longitudinal studies Build case for usefulness of the study (introduction) How the study will advance understanding Explain why the study should be conducted Evaluate, organize, and synthesize literature Keystroke Biometric Studies

A Keystroke Biometric System for Long-Text Input Journal article Int. Journal of Information Security and Privacy Authors Charles C. Tappert, Sung-Hyuk Cha, Mary Villani, and Robert S. Zack Summarizes keystroke biometric work 2005-2010 3 DPS dissertations 2 on identification, 1 on missing/incomplete data About 12 masters-level projects New material – authentication, longitudinal, touch-type model Keystroke Biometric Studies

Build a Case for Usefulness of Study (9 paragraphs of introduction) Validate importance of study – applications Define keystroke biometric Appeal of keystroke over other biometrics Previous work on the keystroke biometric No direct study comparisons on same data Feature measurements Make case for using: data over the internet, long text input, free (arbitrary) text input Extends previous work by authors Summary of paper organization Keystroke Biometric Studies

1) Validate importance of study – describe important applications Internet authentication application Authenticate (verify) student test-takers Internet identification application Identify perpetrators of inappropriate email Internet security for other applications Important as more businesses move toward e-commerce Keystroke Biometric Studies

2) Define Keystroke Biometric The keystroke biometric is one of the less-studied behavioral biometrics Based on the idea that typing patterns are unique to individuals and difficult to duplicate Keystroke Biometric Studies

3) Appeal of Keystroke over other Biometrics Not intrusive – data captured as users type Users type frequently for business/pleasure Inexpensive – keyboards are common No special equipment necessary Can continue to check ID with keystrokes after initial authentication As users continue to type Keystroke Biometric Studies

4) Previous Work on the Keystroke Biometric Identification versus authentication Most studies were on authentication Few on identification (more difficult problem) Short versus long text input Most studies used short input – passwords, names Two commercial products on hardening passwords Few used long text input – copy or free text Other keystroke problems studied One study detected fatigue, stress, etc. Another detected ID change via monitoring Keystroke Biometric Studies

5) No Direct Study Comparisons on Same Data No comparisons on a standard data set (desirable, available for many biometric and pattern recognition problems) Rather, researchers collect their own data Nevertheless, literature optimistic of keystroke biometric potential for security Keystroke Biometric Studies

6) Feature Measurements Features derived from raw data Key press times and key release times Each keystroke provides small amount of data Data varies from different keyboards, different conditions, and different entered texts Using long text input allows Use of good (statistical) feature measurements Generalization over keyboards, conditions, etc. Keystroke Biometric Studies

Keystroke Biometric Studies 7) Make Case for Using Data over the internet Required by applications Long text input More and better features Higher accuracy Free text input Predefined copy texts unacceptable Keystroke Biometric Studies

8) Extends Authors Previous Work Identification feasibility: fixed text & same keyboard for train/test Improved identification system – two independent variables Ideal: same input mode & keyboard type for train/test Non-ideal: different input mode and/or keyboard type for train/test Authentication system and associated studies Ideal and non-ideal conditions as above Longitudinal (over time) identification & authentication studies Hierarchical feature/fallback model and parameter studies New work Further clarifies presentation + improved results Obtained Receiver Operating Characteristic (ROC) curves from k-nearest-neighbor classification procedure Keystroke Biometric Studies

9) Summary of Paper Organization Introduction (described above) System components Data capture over internet Feature extraction Classification – identification and authentication ROC curve derivation – two methods Experimental design and data collection Experimental results Identification Authentication – including ROC curves Longitudinal studies System model and parameters Conclusion and future work Keystroke Biometric Studies

Build a Case for Usefulness of Study (9 paragraphs of introduction) Validate importance of study – applications Define keystroke biometric Appeal of keystroke over other biometrics Previous work on the keystroke biometric No direct study comparisons on same data Feature measurements Make case for using: data over the internet, long text input, free (arbitrary) text input Extends previous work by authors Summary of paper organization Keystroke Biometric Studies

No Explicit Research Question or Hypotheses Implicit research question What identification and authentication performance (accuracy) can be attained by a long-text-input keystroke biometric system and how does performance vary over various controlled changes Implicit research hypotheses Performance decreases In going from ideal to non-ideal conditions As time between enrollment and testing increases As the input text length decreases Keystroke Biometric Studies

Keystroke Biometric Studies Summary Describe problem investigated (intro + abstract) Developed keystroke biometric system for long-text input, identification/authentication performance, two independent variables – keyboard type/input mode, longitudinal studies Build case for usefulness of the study (introduction) How the study will advance understanding Explain why the study should be conducted Evaluate, organize, and synthesize literature Keystroke Biometric Studies