Biometric Products Michael Isola John Granger, Wojciech Hojdysz, Arthur Gadayev.

Slides:



Advertisements
Similar presentations
Collecting data Chapter 6. What is data? Data is raw facts and figures. In order to process data it has to be collected. The method of collecting data.
Advertisements

CIMCO Integration Software Products
Whats New in Office 2010?. Major Changes in Office 2010 The Office Ribbon, which first made its appearance in Office 2007, now appears in all Office 2010.
INFORMATION TECHNOLOGY
AIMSweb Progress Monitor Online User Training
 Copyright I/O International, 2013 Visit us at: A Feature Within from Sales Rep User Friendly Maintenance – with Zip Code.
Google Chrome & Search C Chapter 18. Objectives 1.Use Google Chrome to navigate the Word Wide Web. 2.Manage bookmarks for web pages. 3.Perform basic keyword.
Developing an Excel Application
Tutorial 8: Developing an Excel Application
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Objectives Understand the software development lifecycle Perform calculations Use decision structures Perform data validation Use logical operators Use.
MACROS CS1100 Computer Science and its Applications CS11001.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Bullseye Bullseye was rolled out to our user base on Friday, January 30. I wanted to take this opportunity to give everyone an update on a.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
SVMLight SVMLight is an implementation of Support Vector Machine (SVM) in C. Download source from :
Did you know? A few SAM Tips This presentation will review some of the tips and tricks that might enhance your SAM experience.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. WORD 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 22 Macros.
1. Chapter 9 Maintaining Documents 3 Managing Files As with physical documents, folders, and filing cabinets, electronic files and folders must be well.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
XP New Perspectives on Microsoft Excel 2002 Tutorial 1 1 Microsoft Excel 2002 Tutorial 1 – Using Excel To Manage Financial Data.
Mastering Char to ASCII AND DOING MORE RELATED STRING MANIPULATION Why VB.Net ?  The Language resembles Pseudocode - good for teaching and learning fundamentals.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Software Development Software Testing. Testing Definitions There are many tests going under various names. The following is a general list to get a feel.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
VistA Imaging Capture via Scanning. October VistA Imaging Capture via Scanning The information in this documentation includes only new and updated.
Productivity Programs Common Features and Commands.
Windows Tutorial Common Objects ACOS: 1, 4. Using the Taskbar 1. Using the taskbar, you can switch between open programs and between open documents within.
1. Chapter 4 Customizing Paragraphs 3 More Paragraph Changes Highlight a paragraph in Word by applying borders and shading. Sort paragraphs to control.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Authentication Training Guide 1 The Red Flag Ruling requires automotive dealerships to detect red flags that are applicable to their operation. After.
Log files presented to : Sir Adnan presented by: SHAH RUKH.
User Modeling of Assistive Technology Rich Simpson.
Dec07-02: Prototype Parking Meter Phase 8 Bret Schuring: Team Leader Pooja Ramesh: Communications Wilson Kwong, Matt Swanson, Alex Wernli.
VistA Imaging Workstation Configuration. October The information in this documentation includes functionality of the software after the installation.
Topics Covered Phase 1: Preliminary investigation Phase 1: Preliminary investigation Phase 2: Feasibility Study Phase 2: Feasibility Study Phase 3: System.
Software refer to all the programs that can be run on the computer.
OPERATING SYSTEMS BY LANDON, KYLE, AND ETHAN. WHAT IS THEIR PURPOSE? (1) manage the computer's resources, such as the central processing unit (2) establish.
Analyzing Systems Using Data Dictionaries Systems Analysis and Design, 8e Kendall & Kendall 8.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Basics of Biostatistics for Health Research Session 1 – February 7 th, 2013 Dr. Scott Patten, Professor of Epidemiology Department of Community Health.
What is Voice Thread? VoiceThread is an application that runs inside your web browser, so there is no software to download, install, or update. VoiceThread.
Computing Fundamentals Module Lesson 7 — The Windows Operating System Computer Literacy BASICS.
To increase performance and to add future capabilities to ESC, the following screens have been converted to.NET: Customer Information Qualifications Screen.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
MECH1500 Chapter 3.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Events Programming with Alice and Java First Edition by John Lewis.
IS2210: Systems Analysis and Systems Design and Change Twitter:
Chapter 10 Information Systems Development. Learning Objectives Upon successful completion of this chapter, you will be able to: Explain the overall process.
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
XP 1 Workshop Overview Goal Participants will leave the workshop with some basic Excel skills and the ability to locate and use online resources to continue.
May07-02: Parking Meter Clint Hertz: Team Leader Austyn Trace: Communications Nick Hollander Christian Baldus.
Digital Literacy: Computer Basics
Keystroke Dynamics By Hafez Barghouthi.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Basic Navigation in Oracle R12 BY: Muhammad Irfan.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Maintaining and Updating Windows Server 2008 Lesson 8.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
The New User Interface MEDITECH Training & Education.
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Presentation transcript:

Biometric Products Michael Isola John Granger, Wojciech Hojdysz, Arthur Gadayev

Evaluate several keylogger applications so as to record all keystrokes on a machine on which it is installed. Test keylogger output by converting the keylogger output into the raw- data input format of the Pace University Keystroke Biometric System. Once the format of the keylogger output is converted, obtain system performance on users by running the converted format data through Pace University Keystroke Biometric System. KEYLOGGER Project Description

KEYLOGGER Method of Communication Primary method of communication consists of . is used due to the feasibility of communication and the ability to preserve conversations. Team website is used to communicate project status updates to team customers.

KEYLOGGER Evaluate existing keylogger applications for additional functionality if requirement specifies. If requirement change is outside the current functionality of existing applications, seek and evaluate other applications for specified functionality. Addressing Requirement Changes

KEYLOGGER Keylogger Applications Evaluated

KEYLOGGER  Common output format across all 7 keyloggers used is.HTML format  Several other formats are also available. They range from.CSV to.PDF  While all output can be converted to PKS format, no biometric way to distinguish between users. New requirement was added. Analyses Completed

KEYLOGGER New functionality required from software: Keystroke Dynamics Keystroke Dynamics include: Overall typing speed. Variations of speed moving between specific keys. Common errors. The length of time that keys are depressed. Analyses Completed Continued

KEYLOGGER Basic Key Logger is a standalone key logger which has the ability to capture keyboard and mouse inputs from any application running in parallel. Basic Key Logger also has the ability to record the detailed timing information that describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard. Key Logger records types of operations, keys that are automatically generated, dates, timestamps, durations, overlap, and duration of quiet periods. Application Description

KEYLOGGER Basic Key logger generates two logs (Key Logs, KPC Logs) once monitoring is stopped. Five individuals were given the task to write ten, one hundred word arbitrary paragraphs. The result was 50 Key Logs and 50 KPC logs either one can be used for training and testing. The difference between Key Logs and KPC logs is what each log file records. KPC Logs only log keystrokes. Key Logs in addition to logging keystroke, also log mouse movement and mouse button press and release timings. Gathered logs are available on the Team 3 project website for download and analysis. Key Log Data Gathering

KEYLOGGER Example of a KPC Log

KEYLOGGER Example of a Key Log

 If the key is visible (it writes something when you use it in a text editor), the key logger log will contain a non-null ASCII code and the key of the corresponding key pressed.  For invisible keys (arrows, tabs), the key is a string, e.g., “LSHIFT”.  Keys may also be prefixed. The prefix “ALT+” is added if some ALT key is currently press, and “CTRL+” is added if some Control key is pressed.  The prefix “SHIFT+” is added only if the key is not a letter (and some SHIFT key is currently pressed).  For instance, the “!” character would result in a “SHIFT+1” to be logged.  “SHIFT+a” will not be logged, instead the character “A” will be logged. KEYLOGGER Log Keystroke Attributes

Develop procedure for security testing & demonstration by comparing several test subjects for similarity matrix Use test phrase “My name is…” for all test subjects and “I am a Pace University student” Must use same phrase since product does not allow manipulation of wav file False Acceptance Rate (FAR)-false positives False Rejection Rate (FRR)-false negatives FAR & FRR to be used to grade VoiceCipher biometric Create a file for each test subject to encode with their voice key for testing VOICE Methodology:

VOICE VoiceCipher:

PC/Laptop with microphone attachment Windows XP, Windows 2000,Windows Vista, Windows 7 Microphone Downloadable trials from Voicelatch VOICE System Environment:

10 test subjects selected-5 male,5 female 2 unrecognizable by software (women's’ voices), decided to increase male test subject to 6 for a total of 9 test subjects Each test subject repeated “My name is…” and “I am a Pace University student” 3 times for training system VOICE Training and Recognition:

Each test subject encoded/secured a document file using their voice biometric Each test subject then tried to decode their encoded/secured file with their own voice Each test subject then tried to decode other test subjects encoded/secured file Test subjects(9 total) decoding own files – ‘My name is’ phrase- 4 failures,5 successful for a False Rejection Rate 44% ‘I am a Pace University student’ – 2 failures,7 successful for a False Rejection rate 22% Each test subject decoding all other test subjects encoded files – ‘My name is’ - 16 times accessed of 72 attempts.. False Acceptance Rate 22% ‘I am a Pace University student’ – 10 times accessed of 72 attempts..False Acceptance Rate 14% VOICE Test Results:

VOICE ‘My name is’ phrase Test Results: VoiceCipher Success/Failure Rate Secured by : Attempted by: MikeAndyAnthonySamJoeLenChrisLouiseTheresa Mikeaccess Andyaccess Anthonyaccess Samaccess Joeaccess Lenaccess Chrisaccess Louiseaccess Theresaaccess

VOICE ‘I am a Pace University student’ phrase Test Results: VoiceCipher Success/Failure Rate Secured by : Attempted by: MikeAndyAnthonySamJoeLenChrisLouiseTheresa Mikeaccess Andyaccess Anthonyaccess Samaccess Joeaccess Lenaccess Chrisaccess Louiseaccess Theresaaccess

The tests were repeatable as was proven with ‘My name is’ phrase from first half of semester with same results. Although the software product allowed for a shorter phrase to be used it is more accurate with a longer phrase creating more voice vectors. Future study - Attempt to decode the encoded files using telephone/cassette record voices Try multiple attempts decoding other subjects’ files for a larger pool instead of just one attempt VOICE Conclusion – Follow-Up:

Provides additional security for online identification/authentication Law enforcement to confirm identity (e.g. policing a parole, sex offender, remote monitor alcohol testing for DUI felons and border patrol Accuracy is a challenge for voice biometrics due to high error rates (e.g. change in a person’s voice due to illness or mood) VOICE Voice Biometric Applications:

Questions ?