Computer-User-Input Behavioral Biometrics Dr. Charles C

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Thumbs Up for Security Thumbs Up for Security Overview Dr. Charles Tappert (
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
2015 GenCyber Cybersecurity Workshop Mobile Phone SecurityJuly 10, 2015 Design and User Acceptability Testing of Secure Mobile Phone Authentication Mechanism.
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.
Semantic Web outlook and trends May The Past 24 Odd Years 1984 Lenat’s Cyc vision 1989 TBL’s Web vision 1991 DARPA Knowledge Sharing Effort 1996.
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
SUBTITLE 2015 GenCyber Cybersecurity Workshop In-class Exercise: Components of Cybersecurity Andreea Cotoranu, Vinnie Monaco, and Chuck Tappert Seidenberg.
Explain the purpose of an operating system
Multi Touch Screen Yong Du Ayyappan Iyer. Multi Touch Screen.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
INTRODUCTION & QUESTIONS.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
WELCOME Mobile Applications Testing
Today’s Session Introduction Overview of Biometrics Dr. Charles C
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
IT Security Awareness Day October 19, 2016
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
3.6 Fundamentals of cyber security
Doctor of Professional Studies Orientation
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Chapter 2: Input and output devices
NBKeyboard: An Arm-based Word-gesture keyboard
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Mobile Devices: How they Operate
Computing Curriculum Plans
Keystroke Biometric Authentication on Smartphones Using Short Numeric Input Greg: Our project covers the topic of Keystroke Biometric Authentication, which.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Chapter 11-Business and Technology
Web 2.0 Technologies and Community Building Online by
Elliptic Partial Differential Equations – Direct Method
Computer-User-Input Behavioral Biometrics Dr. Charles C
CS691-CS692-IT691 Capstone Projects Course
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Microsoft Virtual Academy
ONLINE SECURE DATA SERVICE
Seidenberg’s Key Areas of Expertise
CS691-CS692-IT691 Capstone Projects Course
Human and Computer Interaction (H.C.I.) &Communication Skills
Doctor of Professional Studies Orientation Revisited
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Pass-the-Hash.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
CS691-CS692-IT691 Capstone Projects Course
IT Applications with Emerging Techniques: Security Solutions
Computing Curriculum Plans
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Computer-User-Input Behavioral Biometrics Dr. Charles C Computer-User-Input Behavioral Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University http://csis.pace.edu/~ctappert/ Subtitle GenCyber Cybersecurity Workshop at Pace University

Cybersecurity Affects Governments, Companies, and even Individuals Cybersecurity Threats 2018 Cyber Security, Terrorism, and Beyond How the Internet of Things (IoT) Is Changing the Cybersecurity Landscape How Cyber Attacks Affect Individuals and How You can Help Keep them Safe Russian interference in the 2016 United States elections Cyberwarfare by Russia U.S., Britain blame Russia for global cyber attack U.S.-U.K. Warning on Cyberattacks Includes Private Homes List of data breaches and cyber attacks in March 2018

University Research and Projects in Cybersecurity University research and projects are typically on a considerably smaller scale than those undertaken by governments and companies However, there are some areas of cybersecurity where universities can make contributions In the area of biometrics we focus at Pace University on the less-studied biometrics because they have not been as extensively explored as the well-known biometrics One of these areas is computer-user-input behavioral biometrics

What are Computer-User-Input Behavioral Biometrics Authentication or identification of individuals based on the unique way they interact with computer devices With desktop/laptop computers, it is the way people input text (motor control of keystroke input), the words and syntax they use (stylometry), the intent (semantics) of the input, as well as the way they move a mouse With smartphones, and to some extent tablets, it concerns all of the above, and everything from how the user holds the phone to how they swipe the screen to which keyboard or gestural shortcuts they use Of the various biometrics we focus on these at Pace University because they have not been as extensively studied as the well-known biometrics

Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users DARPA: Active Authentication – DoD wants to continually authenticate all gov’t computer users Phase 1: 2010 and 2012 – authenticate users on desktops/laptops Phase 2: 2013 and 2015 – authenticate users on mobile devices Phase 3: 2016 - implementation DARPA: Enhanced Attribution – DoD wants technology to attribute actions in cyberspace to individuals 2016-2020 – network behavior and activity tracking of individuals, fusing generated data for predictive analysis

Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users U.S. Higher Education Opportunity Act of 2008 Concerns authentication of students taking online tests Universities are using more online courses Requires institutions of higher learning to adopt new identification technologies as they become available To assure students of record are those accessing the systems and taking the exams in online courses

Attribution and Intrusion Detection Plan Multi-biometric System Motor control level – keystroke + mouse movement Linguistic level – stylometry (char, word, syntax) Semantic level – target likely intruder commands Intruder Keystroke + Mouse Stylometry Motor Control Level Linguistic Semantic

Keystroke Biometrics Based on idea that generated patterns are unique to individuals and difficult to duplicate Appeal of keystroke over other biometrics Not intrusive, inexpensive, continual user verification The keystroke biometric is one of the less-studied behavioral biometrics

Pace Univ. Keystroke Biometric Studies Most literature studies have been on short input of a few seconds Commercial products on hardening passwords Pace University studies on desktop/laptop mechanical keyboards Short input of few seconds Vinnie Monaco, now at ARL, entered 2016 contest: we have World’s Best System Phone number – similar to CMU study (Ned Bakelman and Vinnie Monaco) Long text input of several minutes Online test taking (Mary Villani, John Stewart, Vinnie Monaco, Steve Kim) Impaired users – left hand, right hand, and both hands input (Gonzalo Perez) Pace University studies on mobile device touchscreens Numeric input – phone # – similar to CMU study (Mike Coakley) Features – pressure & location/area of finger press on keys, acceleration & gyroscope information Names are doctoral students

Mouse Movement and Stylometry Traits

Pace Univ. Mouse & Stylometry Studies Combining keystroke/stylometry info: John Stewart Stylometry can compliment keystroke analysis The correct student may be keying in the test answers provided by a coach, with the student merely typing the coach’s words This would not be discovered via keystroke analysis But potentially could through stylometry analysis Stylometry analysis of Facebook postings Dissertation study by Jenny Li

Interesting Related Videos IBM Trusteer Car Driving Biometric (2 min) The Five Most Dangerous New Attack Techniques – RSA Conf 2018 (44 min) Remarks by Secretary of Department Homeland Security – RSA Conf 2018 (35 min) Other Keynote presentations – RSA Conf 2018 RSA A View of the Future of CyberSecurity – RSA Conf 2017 (2 min) Kahn Academy Cybersecurity 101 Another keystroke biometric demo

Pace Univ. Research Day Conference Brain Signal Biometrics with Virtual Reality Human-Computer Interaction with Virtual Reality using Brain Signals Computing Index of Difficulty Measurement for Handedness in Human Computer Interaction Drunk Driving Prevention Application Using Modern Techniques 2018 Research Day Conference Analyzing Expert Cybersecurity Twitter Accounts by Using Thesaurus Methods for Text Analytics 2017 Research Day Conference – stylometry examples below The Correlation between the Topic and Emotion of Tweets through Machine Learning Sentiment Analysis of Twitter Messages Using Word2Vec

Copyright for Material Reuse These materials are developed with support from the GenCyber program of the National Security Agency and the CyberCorps program of the National Science Foundation. Copyright © 2019 Charles Tappert (ctappert@pace.edu), Pace University. Please properly acknowledge the source for any reuse of the materials as below. Charles Tappert, 2019 GenCyber Cybersecurity Workshop, Pace University Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation. A copy of the license is available at http://www.gnu.org/copyleft/fdl.html.

Acknowledgment The author(s) would like to acknowledge the support from the National Security Agency and the National Science Foundation under Grant No. H98230-19-1-0240. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Security Agency, National Science Foundation or the U.S. government.