Keystroke Biometric System

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Wolverine Access: Faculty Center School of Information | University of Michigan Tiffany Chao, Saurabh Koparkar, Jane Loegel & Megan Morrissey 18 April.
Empowering Staff Through Institute Planning (ESTIP) Executive Workshop Institute Name: XXXXXX Presenter: XXXXXX Date: XXXXXX.
Project Management and Communication Represented by: Latifa Jaber Al-Ghafran.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Stylometry Project IT691 & CS615 Computer Information Systems Projects December, 2007.
Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Getting SMARTer: The evolution of Project Management within Victoria Police Doug Witschi.
CrackingSiebel.com Utility Siebel Repository Extract (SRE) Tool.
Software Engineering Tutorial. Tutorial objectives  Direct application for the SW engineering activities.  Discuss real software development case studies.
Geneva, 30 October 2009 Giuseppe Sindoni, Istat, Italy An online system for multi-channel, register-based census data collection.
Texas Regional Ad Astra Summit Getting the Information You Need: Reporting in Astra Schedule Presented by: Hannah King, Office Manager, Baylor University.
On the sites Two websites that provide learning materials and information Enabling Organisations to meet.
Screen Snapshot Service Kurt Biery SiTracker Monitoring Meeting, 23-Jan-2007.
2: Application Layer1 CS 4244: Internet Software Development Dr. Eli Tilevich.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
1 AARP Tax-Aide Activity Reporting In 2011 Prepared by AARP Foundation Edited for NY3 DC 2010.
Latifa AlAbdlkarim King Saud University October,2009.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Managing Documents the Right Way IA354 Amanda Murphy.
Week 1 -Introduction IT2005 System Analysis & Design.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Tieflow Workflow Toolkit -:By:- CSCI 6831 Capstone project Instructor: Dr. Kwok-Bun Yue Mentor: Mr. Scott Hetherington Midterm Presentation 04/15/2008.
CpE PROJECT: Concurrent Programming - Web Services Aim: To develop a multi threaded web service which handles requests from multiple clients, interact.
On the sites Two websites that provide learning materials and information Enabling organisations to meet.
Elizabeth Wood, Julio Zelaya, Eric Saari, Kenneth King, Mike Gupta, Nicola Howard, Sadia Ismat, Mary Angela Kane, Mark Naumowicz, Daniel Varela, and Mary.
Introduction to Algorithm. What is Algorithm? an algorithm is any well-defined computational procedure that takes some value, or set of values, as input.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Planning Engagement Kickoff
University of Florida EMS Campus Kickoff Martha Elder
Architecture Review 10/11/2004
DHTML.
Information Systems Project Management
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Smart IT Job Advisor and Analysis on web application
Enhancing User identification during Reading by Applying Content-Based Text Analysis to Eye- Movement Patterns Akram Bayat Amir Hossein Bayat Marc.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Paul Ammann & Jeff Offutt
Western Wyoming Community College Human Resources/Payroll Automation
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Chapter 1 Introduction(1.1)
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Enterprise Program Management Office
Dynamic Authentication of Typing Patterns
ESS.VIP VALIDATION An ESS.VIP project for mutual benefits
On the sites Two websites that provide learning materials and information Enabling organisations to meet learning needs Over 250 learning sessions on the.
Name of Research Program: TRUST, SPRING 2011
Joint Application Development (JAD)
Presentation transcript:

Keystroke Biometric System IT 691 Capstone Project Keystroke Biometric System Client: Dr. Mary Villani (SUNY Farmingdale) Instructor: Dr. Charles Tappert Team 4: Tarjani Buch Andreea Cotoranu Eric Jeskey Florin Tihon

Introduction Keystroke biometric systems measure typing characteristics believed to be unique to an individual and difficult to duplicate; A keystroke biometric identification system was developed in the Seidenberg School in 2004 and has since gone through four project iterations with different graduate student teams; The system identifies subjects based on long-text (about 650 keystrokes) samples; Subjects using the same keyboard type (desktop or laptop) and entry mode (copy task or free text input) were identified with degrees of accuracy ranging from 98% to 100%;

Project Requirements Enhance the feature extractor component of the system to output feature data in a standard format; Implement new data collection schedule and collect new data samples to support a longitudinal study on identification experiments; Rerun some of the previous experiments with new data samples; Deliver feature data to back-end teams for additional identification and authentication experiments; Update project web site

System Specifications Pace University’s Utopia Server FTP client Java IDE (Borland’s JBuilder recommended) Java JDK (latest version)

System Components The keystroke biometric system consists of three main components: Java applet for collection of raw data Feature extractor Pattern classifier

System Components (Contd.) Java Applet for collection of raw data Subjects need to register in order to participate in the data collection process; There are four data entry tasks: Copy task on a Desktop Copy task on a Laptop Free text entry on a Desktop Free text entry on a Laptop

System Components (Contd.) Java Applet

System Components (Contd.) Feature Extractor Explanation to this interface can be included in one more slide under this heading.

System Components (Contd.) Pattern Classifier Again, explanation to this interface can be included in one more slide under this heading

New Feature Data Output

New Data Collection Schedule Entry Task Time T0 T1 T2 Copy-Laptop 5 samples Copy-Desktop Free-Text Laptop Free-Text Desktop Total # of Samples 20

Summary of Experimental Design Desktop Laptop Copy Task Free Text 1 4 3 6 5 2

Previous Identification Experiments Train Test Accuracy 1. Copy Task (36 subjects) a Desktop 99.4% b Laptop 100.0% c Combined 99.5% d 60.8% e 60.6% 2. Free Text 98.3% 98.1% 59.0% 61.0% 3. Desktop Copy Free Text 99.2% 89.3% 91.7% 4. Laptop 98.9% 86.2% 91.0% 5. Different Mode/Keyboard Lap Free Desk Copy 98.6% 51.6% 58.0% 6. Different Keyboard/Mode Desk Free Lap Copy 50.3% 52.1% These experiments tested optimal conditions (sub-experiments a and b), combined conditions (sub-experiment c) and less optimal conditions (sub-experiments d and e). All the experiments used the linguistic fallback model. Experiments for optimal and combined conditions used the “leave-one-out” classification method. These experiments revealed a very high level of accuracy, ranging between 98.3% and 100%. Experiments for the less optimal conditions used the “train on one and test on the other” classification method. These experiments revealed a level of accuracy ranging between 50.3% and 91.7%

New Identification Experiments Train/Test Accuracy T0 - T0 T0 - T1 T0 - T2 1. Copy Task (4 subjects) d Desktop/Laptop 100% 85% e Laptop/Desktop 95% 2. Free Text 3. Desktop Copy/Free Text Free Text/Copy 4. Laptop (4subjects) 90% 5. Different Mode/ Keyboard Desk Copy/ Lap Free 75% Lap Free/ Desk Copy 80% 6. Different Keyboard/ Mode Lap Copy/ Desk Free Desk Free/ Lap Copy Average 96% 98% Results support our hypothesis that high degrees of accuracy can be maintained over time

New Identification Experiments (Contd.) Train Test Task Accuracy Keystroke Biometric System Data Mining (Weka) T0 T1 Copy Desk 100% 95% Free Desk Copy Lap Free Lap 85% T2 90% 80%

Summary New experiments support previously documented accuracy findings; New experiments show that a high level of accuracy can be maintained over time; All experimental results are promising in that the system has the capability of solving identification problems and the potential for solving authentication problems; This can be skipped if we outline everything briefly in Deliverables/Accomplishments slide.

Future Recommendations Running experiments with a larger data pool collected under the discussed conditions should provide stronger evidence relative to the success of the keystroke biometric system for identifying and eventually for authenticating subjects. It would also provide more insight into how accuracy evolves from one data collection session to another over time. Although results of current studies support previous experimental results, it is recommended that more raw data be collected following the previously discussed data collection schedule involving two week intervals between data captures;

Communication A single face-to-face meeting with Dr. Mary Villani to get an understanding of the previous work and explore the potential for future developments Bi-weekly group meetings on IM Email communication with the stakeholders on a need basis Team Roles: Tarjani Buch – Data Collection Coordinator Andreea Cotoranu – Team Coordinator - Liaison Eric Jeskey – Architect / Designer Florin Tihon – Quality Officer / Tester

Deliverables/Accomplishments Technical Paper User Manual Enhanced Feature Extractor program to output feature vector in a standard format including normalization of feature values into the range 0-1 Raw data collection with team members as test subjects at two-week intervals Interval 1: T0 - November 3rd 2007 Interval 2: T1 - November 17th 2007 Interval 3: T2 - December 3rd 2007

Keystroke Biometric System Thank You http://utopia.csis.pace.edu/cs691/2007-2008/team4/