Neural Network Typing Authentication

Slides:



Advertisements
Similar presentations
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Advertisements

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Perceptron-based Global Confidence Estimation for Value Prediction Master’s Thesis Michael Black June 26, 2003.
Logistic Regression Rong Jin. Logistic Regression Model  In Gaussian generative model:  Generalize the ratio to a linear model Parameters: w and c.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Hub Queue Size Analyzer Implementing Neural Networks in practice.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
EstiNet Network Simulator & Emulator 2014/06/ 尉遲仲涵.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Presented By: Lauren Ball April 27, 2011 EEL 6788 Project Presentation.
Back-Propagation MLP Neural Network Optimizer ECE 539 Andrew Beckwith.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
NEURAL NETWORKS FOR DATA MINING
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Multiple parallel hidden layers and other improvements to recurrent neural network language modeling ICASSP 2013 Diamantino Caseiro, Andrej Ljolje AT&T.
Handwritten Recognition with Neural Network Chatklaw Jareanpon, Olarik Surinta Mahasarakham University.
Neural Networks Steven Le. Overview Introduction Architectures Learning Techniques Advantages Applications.
Music Genre Classification Alex Stabile. Example File
Neural Network Implementation of Poker AI
 Based on observed functioning of human brain.  (Artificial Neural Networks (ANN)  Our view of neural networks is very simplistic.  We view a neural.
Over-Trained Network Node Removal and Neurotransmitter-Inspired Artificial Neural Networks By: Kyle Wray.
Computer Basics SystemsViruses Alternative Input Speech.
Introduction to Neural Networks Introduction to Neural Networks Applied to OCR and Speech Recognition An actual neuron A crude model of a neuron Computational.
Team Members Ming-Chun Chang Lungisa Matshoba Steven Preston Supervisors Dr James Gain Dr Patrick Marais.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Alex Stabile. Research Questions: Could a computer learn to distinguish between different composers? Why does music by different composers even sound.
Bab 5 Classification: Alternative Techniques Part 4 Artificial Neural Networks Based Classifer.
Computer Vision Scene Classification Using Neural Nets and a Knowledge Base Daniel Vevang.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Analyzing Promoter Sequences with Multilayer Perceptrons Glenn Walker ECE 539.
Kim HS Introduction considering that the amount of MRI data to analyze in present-day clinical trials is often on the order of hundreds or.
Storage Optimization in Distribution Systems Roger Cremers & Gabriël Bloemhof KEMA (The Netherlands) CREMERS – NL – RIF Session 4 – Paper 0180.
Chapter 11 – Neural Nets © Galit Shmueli and Peter Bruce 2010 Data Mining for Business Intelligence Shmueli, Patel & Bruce.
An Evolutionary Algorithm for Neural Network Learning using Direct Encoding Paul Batchis Department of Computer Science Rutgers University.
Speech Recognition through Neural Networks By Mohammad Usman Afzal Mohammad Waseem.
Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Facial Detection via Convolutional Neural Network Nathan Schneider.
ANN-based program for Tablet PC character recognition
Biometric Authentication
Basics of Intrusion Detection
Outline Introduction Characteristics of intrusion detection systems
Big-Data Fundamentals
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Creating fuzzy rules from numerical data using a neural network
CSc 219 Project Proposal Raymond Fraizer.
Introduction to Neural Networks And Their Applications
Java Implementation of Optimal Brain Surgeon
Prof. Carolina Ruiz Department of Computer Science
Lecture-5 Implementation of Information System Part - I Thepul Ginige
Dynamic Authentication of Typing Patterns
network of simple neuron-like computing elements
Introduction to Neural Networks And Their Applications - Basics
Dynamic Authentication of Typing Patterns
Capabilities of Threshold Neurons
EVERFI Student Access Directions
III. Introduction to Neural Networks And Their Applications - Basics
David Kauchak CS158 – Spring 2019
Learning Combinational Logic
Session 1 – Introduction to Information Security
Chapter 21 Successfully Implementing The Information System
Prof. Carolina Ruiz Department of Computer Science
Presentation transcript:

Neural Network Typing Authentication TJ STAR Luke Knepper lukeknep@stanford.edu

The Dilemma Passwords can sometimes be suboptimal Advanced biometrics are expensive Need an alternative

A Solution Authenticate people by how they type Typing patterns differ by person  user’s specific typing characteristics will be used for authentication Cheap and flexible to implement

Background Measures users' typing patterns, compares to a previous standard Technique first used in WWII Works with ~90% Accuracy Effectively implemented in a neural network structure

Background

Development (front-end) On account set-up, user types large amounts of text On subsequent log-ins, user types smaller amount of text Username and password are still needed

Development (back-end) Set-up data is used to train a neural network The node weights are tweaked thousands of times to train the neural network to output the desired result Log-in data will be fed through neural network: result either meets threshold (admitted) or does not meet (rejected)

Experimentation Step 1: Collected lots of test typing data via an online applet www.lukeknepper.com/research.html

Experimentation Step 2: Use this data to test the accuracy of the neural network approach: Train a neural network for each data file collected, run every other file through that neural network, record how many breach

Experimentation Step 3: Tweak the neural network set-up and repeat step 2 to find the optimal neural network

Increased exposure (25 → 50) Results Network Type Mean Training Time % Breached (threshold of .007) Base Network 1.1 s 90.5% Increased exposure (25 → 50) 2.3 s 90.7% Increased Cycles (1000 → 2000) 2.7 s 90.9% Increasing Layers (1 → 3) 3.1 s Increasing All 7.5 s

Another Advantage What if another person jumps on the computer while you are logged in? Can continuously monitor the user's typing patterns during program use If a change is detected, system suspects an intruder and locks the user out

Demo Let’s have some fun.

Neural Network Typing Authentication TJ STAR Luke Knepper lukeknep@stanford.edu