Dynamic Authentication of Typing Patterns

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Advertisements

CSCI 347 / CS 4206: Data Mining Module 07: Implementations Topic 03: Linear Models.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 19 Scheduling IV.
Exercise 3. No.1  (Worse) Everyone are planning to attend the event.  (Better) Everyone is planning to attend the event.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
1 Security problems of your keyboard –Authentication based on key strokes –Compromising emanations consist of electrical, mechanical, or acoustical –Supply.
Classification of Music According to Genres Using Neural Networks, Genetic Algorithms and Fuzzy Systems.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Introduction - The Need for Data Structures Data structures organize data –This gives more efficient programs. More powerful computers encourage more complex.
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Authentication Approaches over Internet Jia Li
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
File Organization Techniques
1 DATABASE TECHNOLOGIES BUS Abdou Illia, Fall 2007 (Week 3, Tuesday 9/4/2007)
Selecting and Combining Tools F. Duveau 02/03/12 F. Duveau 02/03/12 Chapter 14.
Cristian Urs and Ben Riveira. Introduction The article we chose focuses on improving the performance of Genetic Algorithms by: Use of predictive models.
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Database Application Security Models Database Application Security Models 1.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
NEURAL NETWORKS FOR DATA MINING
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
I Information Systems Technology Ross Malaga 4 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 4-1 DATABASE.
Introduction to dCache Zhenping (Jane) Liu ATLAS Computing Facility, Physics Department Brookhaven National Lab 09/12 – 09/13, 2005 USATLAS Tier-1 & Tier-2.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
Design and Implementation of a Dynamic Data MLP to Predict Motion Picture Revenue David A. Gerasimow.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
 Based on observed functioning of human brain.  (Artificial Neural Networks (ANN)  Our view of neural networks is very simplistic.  We view a neural.
Database Management Systems (DBMS)
Neural Network Basics Anns are analytical systems that address problems whose solutions have not been explicitly formulated Structure in which multiple.
Back-Propagation Algorithm AN INTRODUCTION TO LEARNING INTERNAL REPRESENTATIONS BY ERROR PROPAGATION Presented by: Kunal Parmar UHID:
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
"Using An Enhanced Dictionary to Facilitate Auditing Techniques Related to Brute Force SSH and FTP Attacks" Ryan McDougall St. Cloud State University
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Keystroke Dynamics By Hafez Barghouthi.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
An Introduction to Biometrics
6. (supplemental) User Interface Design. User Interface Design System users often judge a system by its interface rather than its functionality A poorly.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Key management issues in PGP
Outline The basic authentication problem
Fall 2004 Perceptron CS478 - Machine Learning.
基于多核加速计算平台的深度神经网络 分割与重训练技术
Ways to protect yourself against hackers
Overview – SOE PatchTT December 2013.
QianZhu, Liang Chen and Gagan Agrawal
Software Design and Architecture
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Introduction to Networking
Basic Concepts in Data Management
Dynamic Authentication of Typing Patterns
Kiran Subramanyam Password Cracking 1.
network of simple neuron-like computing elements
An Introduction to Cloud Computing
An Introduction to Software Architecture
Database management concepts
Capabilities of Threshold Neurons
Faculty of Science IT Department Lecturer: Raz Dara MA.
Exercise: Hashing, Password security, And File Integrity
Operating System Concepts
Modeling IDS using hybrid intelligent systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Neural Network Typing Authentication
Presentation transcript:

Dynamic Authentication of Typing Patterns 2nd Quarter Luke Knepper

Agenda Background Final Process Experimentation Current Results Goals

The Dilemma Passwords are outdated Advanced biometrics are expensive Need an alternative

A Solution Authenticate people by how they type Typing patterns differ by person Studies show that people can be authenticated by their typing patterns Cheap and flexible to implement

The Problem Usually will measure the user's keystrokes when typing in username & passwords Commercial packages available However, uses static text (username & password) → easy to hack Need an improvement

The Fix Generate random text and record keystrokes while the user types it Not a static text segment → Makes it considerably harder to hack No research found on dynamic text segments

Background Measures users' typing patterns, compares to a previous standard Technique first used in WWII Works with ~90% Accuracy Usually implemented in a neural network structure

Background

Process (front-end) On account set-up, user will type large amounts of dynamic text On subsequent log-ins, user will type smaller amount of dynamic text User will still need to use username, password, etc.

Process (back-end) Set-up data will be used to breed (i.e. train) a neural network The optimal weight vector can be generated efficiently via back-propagation, genetic algorithms, parallel processing Log-in data will be fed through neural network: result either meets threshold (admitted) or does not meet (rejected)

Experimentation Requirements: Must develop optimal neural network and threshold value for back-end Must develop optimal GUI / Corpus size Must determine accuracy

Experimentation Neural Network Optimization: Develop online data collection applet Collect massive amounts of data Use data to train multiple neural network types Test different network types to determine optimal network and threshold

Experimentation Neural Network Optimization: Will train a neural network for each data file collected Sample data will be sent through the neural network Success vs. Failure ratio will be measured and compared between different network types

Experimentation Accuracy Testing: Collect large number of test subjects Subjects set up dummy accounts Subjects attempt to log into their accounts and accounts of others on subsequent sittings (spaced out by 1 week and 1 month) Measure final accuracy

Current Results Proof-of-concept program Determines the mystery typer between two known users Uses simple single-layer neural network Correct 18 / 20 = 90%

Current Results Data collection Flash applet Shows user segment of dynamic text, asks them to type it in a box below Records their keystroke times Sends keystroke data to server to be stored in separate files

Current Results Keystroke data file format: For each keystroke, records the following: Key-# / up-or-down / time-in-millis Example: “65 U 22424” Flexible format allows for different characteristics to be measured (e.g. time between strokes or time of depression)

Current Results Working on an automated testing system First will train neural networks of each type for every data file as noted before Then will record the results of each neural network through automated tested Finally will compute statistics for the accuracy of the different types

Goals Final program interface will be: Easily implementable Difficult to crack Accurate above 90% Will be combined with password security to make inexpensive and secure system

Fin Questions and wrap-up