Keystroke Dynamics Jacob Wise and Chong Gu. Introduction ● People have “unique” typing patterns – “Unique” in the same way that fingerprints aren't proven.

Slides:



Advertisements
Similar presentations
Dynamic Grid Optimisation TERENA Conference, Lijmerick 5/6/02 A. P. Millar University of Glasgow.
Advertisements

Machine Learning Homework
Maintaining data quality: fundamental steps
Chapter 7 Hypothesis Testing
1 Survey Technology. Data Collection Tools Available in the Market 1. Paper Survey 2. Smart Paper 3. Cell Phones 4. Personal Digital Assistants - PDAs.
Introduction to Microsoft Access
Animal, Plant & Soil Science
Behavior-based Authentication Systems
Non-Text Passwords CRyptography Applications Bistro Jessica Greer February 12, 2004.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Classification of Music According to Genres Using Neural Networks, Genetic Algorithms and Fuzzy Systems.
Experimental Evaluation in Computer Science: A Quantitative Study Paul Lukowicz, Ernst A. Heinz, Lutz Prechelt and Walter F. Tichy Journal of Systems and.
Fingerprint Authentication Kevin Amendt David Friend April 26, MIT Course Project Presentations.
“Use of contour signatures and classification methods to optimize the tool life in metal machining” Enrique Alegrea, Rocío Alaiz-Rodrígueza, Joaquín Barreirob.
Two main requirements: 1. Implementation Inspection policies (scheduling algorithms) that will extand the current AutoSched software : Taking to account.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Keystroke Dynamics Jarmo Ilonen. Structure of presentation Introduction Keystroke dynamics for Verification Identification Commercial system: BioPassword.
New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Computer Account Hijacking Detection Using a Neural Network Nick Pongratz Math 340.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Program ultrasonic range sensor in autonomous mode
By Edward Lim 8.7.  What?  Today we started the Cornerstone Piece and we were given a few tasks to complete. The tasks were to watch the Kurt Fearnly.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Unit 1 Accuracy & Precision.  Data (Singular: datum or “a data point”): The information collected in an experiment. Can be numbers (quantitative) or.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
‘Tirgul’ # 7 Enterprise Development Using Visual Basic 6.0 Autumn 2002 Tirgul #7.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Keller and Ozment (1999)  Problems of driver turnover  Costs $3,000 to $12,000 per driver  Shipper effect  SCM impact  Tested solutions  Pay raise.
Johann Schumann and Pramod Gupta NASA Ames Research Center Bayesian Verification & Validation tools.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Cooperative Learning Statistical Significance and Effect Size By: Jake Eichten and Shorena Dolaberidze.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Program #2 Cell Phone Usage ….Let’s start with understanding the problem!
© 2008 General Parts International, Inc. Written permission is required to copy or forward to anyone other than the intended recipient. TeammateTime Store.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
CSE & CSE6002E - Soft Computing Winter Semester, 2011 Neural Networks Videos Brief Review The Next Generation Neural Networks - Geoff Hinton.
ACT-PRO Action Protocol Tracer A Tool for Analyzing Simple, Rule- based Tasks Wai-Tat Fu & Wayne D. Gray ARCH Lab George Mason University.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Understand Permissions LESSON Security Fundamentals.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Introduction to Engineering Calculations Chapter 2.
Keystroke Dynamics By Hafez Barghouthi.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LACSI 2002, slide 1 Performance Prediction for Simple CPU and Network Sharing Shreenivasa Venkataramaiah Jaspal Subhlok University of Houston LACSI Symposium.
Page ADP PearsonAccess Proctor Training. Page Agenda Test Overview Testing Components Proctor Roles and Responsibilities Overview Administering the Test.
Lesson 18: Sampling Variability and the Effect of Sample Size Students use data from a random sample to estimate a population mean. Students know that.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
How to “Black Box” a Model A large model usually consists of sub-assemblies that are built before being attached to the main assembly. In 3DCS, the model.
An Introduction to Biometrics
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Disseminating Research Findings Shawn A. Lawrence, PhD, LCSW SOW 3401
Keystroke Biometric Studies
The Devil and Packet Trace Anonymization
Parts of a Lab Write-up.
PPP – Point to Point Protocol
Assessment Dates Lesson 1:
Introduction Deregulation of the market: facilities to new producers
Dynamic Authentication of Typing Patterns
A SEMINAR REPORT ON BIOMETRICS
Dynamic Authentication of Typing Patterns
AN INEXPENSIVE ROBOTIC KIT FOR CHILDREN EDUCATION
Neural Network Typing Authentication
Presentation transcript:

Keystroke Dynamics Jacob Wise and Chong Gu

Introduction ● People have “unique” typing patterns – “Unique” in the same way that fingerprints aren't proven unique ● Typing patterns could be used for authentication – Stronger than password – Harder to copy – Can use challenge-response ● Inexpensive

Previous Work ● Neural Networks – Less mainstream approach – Papers co-authored by M.S. Obaidat ● “Traditional” Approach – Reference Signatures computed by calculating the Mean and Standard Deviations – Measures “distance” between Reference Signature and Test Signature – Use digraph/trigraph – Rick Joyce & Gopal Gupta (1990); F. Monrose & a. Rubin (1997); F. Bergadano, D. Bunetti, and C. Picardi (2002)

First problem - Collecting Data ● Built-in.NET DateTime class – Precise only to about 10 milliseconds ● Methods from kernel32.dll – About 15 significant digits (don't know for sure)

First Prototype ● Timing Data for all fields – User Name – Password – Full Name ● Mistakes not allowed ● Signature object is serialized and saved to a file

The World of Neural Networks ● User Name / Password / Full Name unsuitable – Can't train a neural network on only positive examples – Would need to collect break-in attempts by other users ● Hence the “Counterexample” option in the first prototype ● Everyone-Types-The-Same-Thing works better – Hence the passage collection form...

The Passage Collection Form

Passage Analysis Form ● Tool to help analyze collected keystroke data – Data is in.psig (PassageSignature) and.signature (Signature) files ● We hope this tool will be used and extended in future work on this project ● Tabs for BPN (Back-Propagation Network), more traditional analyses, and others that are yet to come

Passage Analysis Form

[neural networks] ● Explain BPN basics ● This started as just a first step ● Ended up taking the whole time to tune

“Traditional” Approach ● Reference Signature – Computed by calculating the mean and standard deviation of samples each user has provided – Based on Press Time or Flight Time – Samples that are too far off (greater than a certain threshold above the mean) are discarded. The Means are recalculated. ● This value needs to be tuned ● 3 std results in 0.85% of samples being discarded ● 2 std results in 5% of samples being discarded

“Traditional” Approach - Reference Signatures based on Flight Time

“Traditional” Approach - Reference Signatures based on Press Time

“Traditional” Approach - Reference Signatures We have noticed that there is a bigger variance between users if we base our Reference Signatures on Flight Times.

“Traditional” approach - the Verifier ● Two approaches have been considered, but neither is up and running – Comparing individual Press/flight time of test signature with the Mean Reference Signature. A press/flight time is considered to be valid if it is within x profile standard deviations of the mean reference digraph. (where x needs to be tuned) – Comparing the magnitude of difference between the mean reference signature (M) and the test signature (T). A certain threshold for an acceptable size of the magnitude is required. A user with a bigger variability of his/her signatures, a bigger threshold value should be used. ● This approach has had some good results ● Again, the threshold value needs to be tuned.

Conclusion ● We have... – Done lots of work but just barely scratched the surface – Focused getting some usable analysis tools up and running – Implemented fairly standard algorithms according to previous research ● There is a lot of work to be done!

Epilogue ● Papers that excite us and into which we didn't have time to seriously delve: – “User Authentication through Keystroke Dynamics” Bergadano, Gunetti, Picardi (2002) – “Password hardening based on keystroke dynamics” Monrose, Reiter, Wetzel (2001) ● Not just authentication