Keystroke Biometrics Study Software Engineering Project Team + DPS Student.

Slides:



Advertisements
Similar presentations
Allegory An allegory is a form of extended metaphor in which objects, persons, and actions are made to represent something outside the story itself. In.
Advertisements

Keyboard Training Instruction by: Connie Hutchison & Christopher McCoy.
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Sunday Business Systems Using Access More Efficiently Tips and tricks to make things easy.
Grades 1-4. K-4 Standards: A1,2,9 – Grade 1 Vocabulary Identify basic computer parts: computer, monitor, keyboard, mouse Uses proper vocabulary for on-screen.
Word Moving the Insertion Point. Using the Arrows  Moves one character to the right  Moves one character to the left  Moves one line up  Moves one.
DEVELOPING ICT SKILLS PART -TWO
Tutorial 8: Developing an Excel Application
Access - Project 1 l What Is a Database? –A Collection of Data –Organized in a manner to allow: »Access »Retrieval »Use of That Data.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Biometric Products Michael Isola John Granger, Wojciech Hojdysz, Arthur Gadayev.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
1 Security problems of your keyboard –Authentication based on key strokes –Compromising emanations consist of electrical, mechanical, or acoustical –Supply.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Chapter 1 Introduction to Databases
Computers: Getting Started 6 May Today we will learn: 1. Overview: parts of a computer 2. How to use a computer mouse 3. Computer Basics: Terms.
Security-Authentication
Formatting and Editing Skills
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Working with Worksheet
Jeopardy Keyboard Computer Parts Computer Parts Networks Internet Word Processing Basic Level.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Get to Know Your Keyboard. Operational Keys Escape (Esc) – allows you to exit unwanted menus and dialog boxes Tab – used to indent; moves the cursor 5.
Microsoft Access Data Base Application. A Few Terms Database – A collection of related information. Database – A collection of related information. Field.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Jeopardy Keyboard Computer Parts NetworksInternet Spread- sheets
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Just as there are many human languages, there are many computer programming languages that can be used to develop software. Some are named after people,
Copyright 2002, Paradigm Publishing Inc. CHAPTER 17 BACKNEXTEND 17-1 LINKS TO OBJECTIVES Line Numbering Bookmarks AutoText Nonbreaking Space Nonbreaking.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Downloading and Installing Autodesk Revit 2016
Unit 1. Alternate Key Also called ALT key Executes commands with other key(s)
Basic Editing Lesson 2.
Data Structures and Algorithms Lecture 1 Instructor: Quratulain Date: 1 st Sep, 2009.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Beginners: Microsoft Office Word 2007 Lesson 2: Entering Text Isaac Katete.
ICT 111 – PART 2 APPLICATIONS SOFTWARE /11: APPLICATIONS SOFTWARE Remember: Computer hardware VS human body Computer operating systems VS human.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Lesson 13 Databases Unit 2—Using the Computer. Computer Concepts BASICS - 22 Objectives Define the purpose and function of database software. Identify.
Lesson 1 - Understanding the Word Window and Creating a New Document
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Document Processing Keyboarding Objective 4.01 – Apply formatting and editing features.
Microsoft Excel 2002—The Basics Presented by: Kyle Kuehler Instructional Technology Specialist (806)
Instructions As the slides are displayed, discuss each slide to promote the correct keyboarding position and the proper use of various keys on the keyboard.
Keystroke Dynamics By Hafez Barghouthi.
Editing Basics. Open Word and complete the following steps:  Key your first and last name  Enter twice  Key the following sentence as many times as.
COMPUTER INPUT DEVICE Keyboard. Keyboard cont…… Print Screen Print contents of screen Pause/Break Terminate/Interrupt Scroll Lock Modify behavior of the.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Standard Input Devices
DATABASE.
Keystroke Biometric Studies
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Enhancing User identification during Reading by Applying Content-Based Text Analysis to Eye- Movement Patterns Akram Bayat Amir Hossein Bayat Marc.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric System
EXCEL Study Guide #2.
Dynamic Authentication of Typing Patterns
Year 9 Entry Level Computing
Keyboarding Vocabulary
University of Warith AL-Anbiya’a
Keyboarding Vocabulary
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Keystroke Biometrics Study Software Engineering Project Team + DPS Student

2 Keystroke Biometric As with other biometrics, the keystroke one is becoming important for security apps Advantage - inexpensive and easy to implement, the only hardware needed is a keyboard Disadvantage - behavioral rather than physiological biometric, easy to disguise One of the least studied biometrics, thus good for dissertation studies

3 Focus of Study Previous studies mostly concerned short character string input Password hardening Short name strings We focus on large text input 200 or more characters per sample

4 Focus of Study (cont) Applications of interest Identification 1-of-n classification problem e.g., sender of inappropriate in a business environment with a limited number of employees Verification Binary classification problem, yes/no e.g., student taking online exam

5 Software Components Raw Keystroke Data Capture over the Internet (Java applet) Feature Extraction (SAS software) Classification (SAS software) Training Testing

6 Keystroke Data Capture (Java Applet) Raw data recorded for each entry Key’s character Key’s code text equivalent Key’s location on keyboard 1 = standard, 2 = left, 3 = right Time key was pressed (msec) Time key was released (msec) Number of left, right, double mouse clicks

7 Keystroke Data Capture (Java Applet)

8 Aligned Raw Data File (Hello World!)

9 SAS Statistical Software: Feature Extraction & Classification Powerful tool with its own programming language and development environment Data management Relational database built-in Many data manipulation functions Statistical analysis Library of procedures to do a wide variety of statistical analyses

10 Feature Extraction 10 Mean and 10 Std of key press durations 8 most frequent alphabet letters (e, a, r, i, o, t, n, s) Space & shift keys 10 Mean and 10 Std of key transitions 8 most common digrams (in, th, ti, on, an, he, al, er) Space-to-any-letter & any-letter-to-space 15 Total number of keypresses for Space, backspace, delete, insert, home, end, enter, ctrl, 4 arrow keys combined, shift (left), shift (right), total entry time, left, right, & double mouse clicks

11 Feature Measurement Sample

12 Feature Extraction Preprocessing Outlier removal Remove samples > 2 std from mean Prevents skewing of feature measurements caused by pausing of the keystroker Standardization x’ = (x - xmin) / (xmax - xmin) Scales to range 0-1 to give roughly equal weight to each feature

13 Classification Identification Nearest neighbor classifier using Euclidean distance Input sample compared to every training sample Verification Dichotomizer (feature difference model) Train with neural network

14 Experimental Design: Identification Experiment 15 subjects that know the purpose of exp. Training – 5 reps of text a (approx. 600 char) Testing 5 reps of text a 5 reps of text b (same length as text a) 5 reps of text c (half length of text a) 28 subjects don’t know purpose of input Subset of above training/testing data Also, arbitrary text input of reasonable length

15 Experimental Design: Instructions for Subjects All subjects will be told to make any necessary corrections to the input data (texts a, b, and c are Aesop fables) Knowing subjects will be told to input the data using their normal keystroke dynamics The experiments are designed so that subjects leave at least a day between entering samples

16 Experimental Design: Text a – about 600 characters This is an Aesop fable about the bat and the weasels. A bat who fell upon the ground and was caught by a weasel pleaded to be spared his life. The weasel refused, saying that he was by nature the enemy of all birds. The bat assured him that he was not a bird, but a mouse, and thus was set free. Shortly afterwards the bat again fell to the ground and was caught by another weasel, whom he likewise entreated not to eat him. The weasel said that he had a special hostility to mice. The bat assured him that he was not a mouse, but a bat, and thus a second time escaped. The moral of the story: it is wise to turn circumstances to good account.

17 Experimental Design (cont) Verification Basically the same as for identification The training and testing data consists of various text input samples collected over a period of approximately 10 weeks

18 Expected Outcomes: Recognition Accuracy Accuracy on text a > that on text b text a is the training text Accuracy on text b > that on text c text b is longer than text c Accuracy on texts a, b, c > arbitrary text texts a, b, & c are similar, all Aesop fables Accuracy on knowing subjects > that on unknowing ones Knowing subjects are more likely to use their normal keystroke dynamics for all input

19 Expected Outcomes: Analysis of Experimental Results Feature analysis – which are better? Key press durations or transitions More or less frequent letters/digrams Other feature measurements Determine the spread (std) of feature measurements within versus across subjects

20 Preliminary Results Reduced identification experiment Smaller text input “The quick brown fox jumps over the lazy dog.” Fewer subjects Three project team members Fewer feature measurements Mean and std for “e” and “o” key press durations Accuracy of 80%, which is promising

21 Questions/Comments? Focus or applications? Software implementation? Experimental design? Expected experimental outcomes?