Behavior based User Authentication on Smart Phones

Slides:



Advertisements
Similar presentations
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. GENOM-POF: Multi-Objective Evolutionary Synthesis of Analog ICs with Corners.
Advertisements

Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
1 Evolvable Malware Sadia Noreen, Sahafq Murtaza, M. Zubair Shafiq, Muddassar Farooq National University of Computer and Emerging Sciences (FAST-NUCES)
C SC 421: Artificial Intelligence …or Computational Intelligence Alex Thomo
The Decision-Making Process IT Brainpower
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Research Problem. Outline 1. Learn how to define a research problem in CS field.
University of Toronto Department of Computer Science CSC444 Lec04- 1 Lecture 4: Software Lifecycles The Software Process Waterfall model Rapid Prototyping.
Artificial Intelligence
Muhammad Shahzad 1, Saira Zahid 1, Syed Ali Khayam 1,2, Muddassar Farooq 1 1 Next Generation Intelligent Networks Research Center National University of.
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
SEC835 Database and Web application security Information Security Architecture.
revised CmpE 583 Fall 2006Discussion: OWL- 1 CmpE 583- Web Semantics: Theory and Practice DISCUSSION: OWL Atilla ELÇİ Computer Engineering.
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
Nadpis 1 Nadpis 2 Nadpis 3 Jméno Příjmení Vysoké učení technické v Brně, Fakulta informačních technologií v Brně Božetěchova 2, Brno
 Day 59 Computer Science and Industry Exploring The Intersection Between CS and Other Fields.
1 Formal Verification of Candidate Solutions for Evolutionary Circuit Design (Entry 04) Zdeněk Vašíček and Lukáš Sekanina Faculty of Information Technology.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
Immune-inspired Network Intrusion Detection System (i-NIDS) 1 Next Generation Intelligent Networks Research Center National University of Computer & Emerging.
CAREER CHOICE.. Engineering is about applying math, science, and logic to develop, improve, and test things like buildings, machines, manufacturing processes,
Real-Time Intelligence That Matters. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business The Last G-20 Country To Embrace The.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
Written by : Oren Frenkel Intel Confidential ® C CD SDS.
Introduction to Machine Learning, its potential usage in network area,
Advanced Software Engineering Dr. Cheng
EGI towards H2020 Feedback (from survey)
By Dr.G.K.D.Prasanna Venkatesan, Professor
CompSci 280 S Introduction to Software Development
Marking the Most of the Web’s Resources
Emerging Applications and Platforms in Embedded and Realtime Systems
Evolvable Malware Sadia Noreen, Sahafq Murtaza, M. Zubair Shafiq, Muddassar Farooq National University of Computer and Emerging Sciences (FAST-NUCES) Next.
On Routine Evolution of Complex Cellular Automata
Fundamentals of Information Systems, Sixth Edition
Tomas Pecenka, Lukas Sekanina, Zdenek Kotasek
Immune-inspired Network Intrusion Detection System (i-NIDS)
Introduction Characteristics Advantages Limitations
Intro to Machine Learning
Introduction to System Analysis and Design
Objectives of the Course and Preliminaries
Zdeněk Vašíček and Lukáš Sekanina
Introduction to Soft Computing
WinHEC Online & Fall Creators Update Overview
Software Processes.
Unit 4 Introducing the Study.
Advanced Artificial Intelligence Evolutionary Search Algorithm
Model-Driven Analysis Frameworks for Embedded Systems
NAE Global Challenge Scholars Program Annual Meeting on October 30.
Seminar Presentation on Biometrics
An Efficient method to recommend research papers and highly influential authors. VIRAJITHA KARNATAPU.
Automatic Discovery of Network Applications: A Hybrid Approach
Thoughts on HCI Requirements Elicitation
Presentation for information days Units involved:
Design and Implementation
iSRD Spam Review Detection with Imbalanced Data Distributions
Driver Verification Using Eye Movements and Blinking
Copyright © JanBask Training. All rights reserved Top 10 Charming IT jobs that would be High in Demand in 2019.
TNK-115 Using the Internet of Things for secure Urban solutions in a Smart CitY VANGELIS ANGELAKIS ITN - Linköping University.
Dr. Unnikrishnan P.C. Professor, EEE
CompSci 1: Principles of Computer Science Lecture 1 Course Overview
Research Methods Designing a research project: Getting started.
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
IoT, Tekoäly ja wearables
ROLE OF «electronic virtual enhanced research-engaged student teams» WEB PORTAL IN SOLUTION OF PROBLEM OF COLLABORATION INTERNATIONAL TEAMS INSIDE ONE.
Industry Liaison Sub-Committee Report for the year 2013
BCI Research at the ISRC, University of Ulster N. Ireland, UK
ERP and Related Technologies
Presentation transcript:

Behavior based User Authentication on Smart Phones GECCO HUMIES - 2009 Behavior based User Authentication on Smart Phones Muhammad Shahzad1, Saira Zahid1, Syed Ali Khayam1,2, Muddassar Farooq1 1 Next Generation Intelligent Networks Research Center National University of Computer & Emerging Sciences Islamabad, Pakistan http://www.nexginrc.org 2 School of Electrical Engineering & Computer Sciences National University of Sciences & Technology Islamabad, Pakistan http://wisnet.seecs.edu.pk

Citations Muhammad Shahzad, Saira Zahid, Muddassar Farooq, "A Hybrid GA-PSO Fuzzy System for User Identification on Smart Phones", Genetic and Evolutionary Computation Conference (GECCO), July, 2009, Montréal, Canada. (In Press) Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq, "Keystroke-based User Identification on Smart Phones", 12th International Symposium on Recent Advances in Intrusion Detection (RAID), Sept, 2009, Brittany, France. (In Press)

Smart Phones Market BCC Research group published a 149 page report : “Global Market for Smart Phones and PDAs” in May 2009. Its digital copy costs $4850 2008: Global market of Smart Phones generated $58.7 billion 2013: expected to increase to $153.3 billion

User Identification on Smart Phones: A Hot Issue Mobile computing devices combine three extremely potent concepts computing mobility miniaturization Information Security on mobile phones is a serious concern of both users and manufacturers Red herring mobiles scream for help: UK-based mobile security company adds security to mobile phones, October 2006. Ernst and Young Global Information Security Survey 2005 : Report on the Widening Gap

Its in your Hands, like its in your Eyes and Face It is believed that keystrokes of people are distinct from each other just like their faces, finger prints, and eyes Doesn’t require any extra hardware for identification

Keystrokes based Analysis: A long sought solution A lot of research effort was focused towards keystroke-based user identification in 80s, 90s, and the current decade Most of the work has been done in desktop domain In 80s Umphress and Williams 1985 6% FAR Legget and Williams 1988 5% FAR In 90s Bleha, Slivinsky, and Hussein 1990 8.1% FRR, 2.8% FAR Joyce and Gupta 1990 16.67% FRR, 0.25% FAR Legget and Williams 1991 11.1% FRR, 12.8% FAR Obaidat and Sadoun 1999 Recently Clarke and Furnell in 2007, worked on Mobile Phones 18%FAR, 29% FRR

Keystrokes based Analysis: A long sought solution The accuracy of existing solutions is quite far from acceptable All the work done till now has been in static controlled environments and the best results had 5% error rate We tested the schemes of earlier researchers on mobile dataset Provided abysmal accuracy: Even the best had 30% errors in our dynamic uncontrolled environment Multiplexed Keypads

A Problem of Bio-inspired Classification No one realized that this is a problem of bio-inspired classifier Every one was using machine learning classifiers Once we realized that conventional classifiers are not working, we decided to go unconventional We designed a novel bio-inspired classifier and the improvement in results was not incremental: the accuracy improved dramatically Diffusion in the dataset was handled using Fuzzy Logic

A Problem of Bio-inspired Classification Used GA, PSO and Hybrid of PSO and GA to optimize fuzzy (F) The result is equal to or better than a result that was considered an achievement in its field at the time it was first discovered. PSO GA Our proposed scheme reduced the errors to 2% In static Analysis we reduced errors to 0%

Detection Mode Verification Mode Training Mode Modes Algorithm for

Error %ages of classifiers on Mobile Datasets (E) The result is equal to or better than the most recent human-created solution to a long-standing problem for which there has been a succession of increasingly better human-created solutions.

The Best Entry GECCO 2009 – Anonymous Reviewers’ Comments I like this paper, it is clearly written with a sophisticated command of mechanics and style, it addresses a real world problem using real world data, uses sound methodology, and shows promising results. In any case, the classifier obtained by optimizing fuzzy rules using a hybrid GA/PSO method is quite interesting and might be worth a separate evaluation as a stand-alone classification tool, independent of the application. RAID 2009 – Anonymous Reviewers’ Comments The work is both deep, demonstrating an improvement over approaches that have been used on desktop machines, and broad, considering how to use their approach, and describing limitations of that approach. I thought that the topic was interesting and relevant, and that the constrained keypad of a mobile phone provides a natural opportunity! for good results.

The Best Entry We collected keystrokes data of 25 users from diverse backgrounds It was very hard to convince people because of privacy concerns This is the first dataset of its kind available freely at http://www.nexginrc.org Our problem addresses security so lets see how this system is taken in the community of its interest Paper accepted in RAID 2009: the conference that ranks among the top 5 security conferences in world The problem is so hot that even RAID 2008 had a research paper on keystroke dynamics though inconclusive Our Problem difficulty is extremely high in its domain, and after over 20 years we have succeeded to make this concept deployable in the real world (G) The result solves a problem of indisputable difficulty in its field.

Prototype Version Prototype Version of the product is ready and you are welcomed to test it at the end of presentation session