Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
Data preprocessing before classification In Kennedy et al.: “Solving data mining problems”
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
July 11 - September FFIEC Central Data Repository Bank Enrollment.
Behavior-based Authentication Systems
Non-Text Passwords CRyptography Applications Bistro Jessica Greer February 12, 2004.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Mouse Movement Biometrics, Pace University, Fall'20071 Mouse Movement Biometrics Fall 2007 Capstone -Team Members Rafael Diaz Michael Lampe Nkem Ajufor.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometrics Test Taker Setup and Data Collection Fall 2009.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Mouse Movement Project Customer: Larry Immohr Professor: Dr. Charles Tappert Team: Shinese Noble Anil Ramapanicker Pranav Shah Adam Weiss.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Thumbs Up for Security Thumbs Up for Security Overview Dr. Charles Tappert (
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
An Overview to Biometrics Giang Ngo Justin Simone Huguens St. Fort.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
Biometrics: Ear Recognition
Authentication Approaches over Internet Jia Li
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
© URENIO Research Unit 2004 URENIO Online Benchmarking Application Thessaloniki 7 th of October 2004 Isidoros Passas BEng Computer System Engineering.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Speaker Recognition By Afshan Hina.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
Understanding and Predicting Graded Search Satisfaction Tang Yuk Yu 1.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
FMCSA Portal Enforcement: Online Self Service Account Management Prioritization Phase I Release, December 2010 v1.0.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Keystroke Recognition using WiFi Signals
EFFICIENT ROAD MAPPING VIA INTERACTIVE IMAGE SEGMENTATION Presenter: Alexander Velizhev CMRT’09 ISPRS Workshop O. Barinova, R. Shapovalov, S. Sudakov,
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
1st NRC Meeting, October 2006, Amsterdam 1 Data Management Procedures Preview of software used in ICCS Michael Jung, IEA Data Processing Center.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
MULTI-BIOMETRIC SYSTEM Chris Chiffriller, Chris George, Gabriel Dos Santos, Subah Sachdeva.
Keystroke Dynamics By Hafez Barghouthi.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Clickprints on the Web: Are there Signatures in Web Browsing Data?
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric Studies
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
DAISY Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
Keystroke Recognition using Wi-Fi Signals
Computer-User-Input Behavioral Biometrics Dr. Charles C
Presentation transcript:

Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS

Keystroke Biometric Studies Introduction Validate importance of study – applications Internet authentication application Authenticate (verify) student test-takers Internet identification application Identify perpetrators of inappropriate Internet security for other applications Important as more businesses move toward e-commerce

Keystroke Biometric Studies Introduction Define Keystroke Biometric The keystroke biometric is one of the less-studied behavioral biometrics Based on the idea that typing patterns are unique to individuals and difficult to duplicate

Keystroke Biometric Studies Introduction Appeal of Keystroke Biometric Not intrusive – data captured as users type Users type frequently for business/pleasure Inexpensive – keyboards are common No special equipment necessary Can continue to check ID with keystrokes after initial authentication As users continue to type

Keystroke Biometric Studies Introduction Previous Work on Keystroke Biometric One early study goes back to typewriter input Identification versus authentication Most studies were on authentication Two commercial products on hardening passwords Few on identification (more difficult problem) Short versus long text input Most studies used short input – passwords, names Few used long text input –copy or free text Other keystroke problems studies One study detected fatigue, stress, etc. Another detected ID change via monitoring

Keystroke Biometric Studies Introduction Feature Measurements Features derived from raw data Key press times and key release times Each keystroke provides small amount of data Data varies from different keyboards, different conditions, and different entered texts Using long text input allows Use of good (statistical) feature measurements Generalization over keyboards, conditions, etc.

Keystroke Biometric Studies Introduction Make Case for Using Data over the internet Required by applications Long text input More and better features Higher accuracy Free text input Required by applications Predefined copy texts unacceptable

Keystroke Biometric Studies Introduction Summary of Scope and Methodology Determine distinctiveness of keystroke patterns Two application types Identification (1-of-n problem) Authentication (yes/no problem) Two indep. variables (4 data quadrants) Keyboard type – desktop versus laptop Entry mode – copy versus free text

Keystroke Biometric Studies Keystroke Biometric System Components Raw keystroke data capture Feature extraction Classification for identification Classification for authentication

Keystroke Biometric Studies Keystroke Biometric System Raw Keystroke Data Capture

Keystroke Biometric Studies Keystroke Biometric System Raw Keystroke Data Capture

Keystroke Biometric Studies Keystroke Biometric System Feature Extraction Mostly statistical features Averages and standard deviations Key press times Transition times between keystroke pairs Individual keys and groups of keys – hierarchy Percentage features Percentage use of non-letter keys Percentage use of mouse clicks Input rates – average time/keystroke

Keystroke Biometric Studies Keystroke Biometric System Feature Extraction A two-key sequence (th) showing the two transition measures

Keystroke Biometric Studies Keystroke Biometric System Feature Extraction Hierarchy tree for the 39 duration categories

Keystroke Biometric Studies Keystroke Biometric System Feature Extraction Hierarchy tree for the 35 transition categories

Keystroke Biometric Studies Keystroke Biometric System Feature Extraction Two preprocessing steps Outlier removal Remove duration and transition times > threshold Feature standardization Convert features into the range 0-1

Keystroke Biometric Studies Keystroke Biometric System Classification for Identification Nearest neighbor using Euclidean distance Compare a test sample against the training samples, and the author of the nearest training sample is identified as the author of the test sample

Keystroke Biometric Studies Experimental Design and Data Collection Design Two independent variables Keyboard type Desktop – all Dell Laptop – 90% Dell + IBM, Compaq, Apple, HP, Toshiba Input mode Copy task – predefined text Free text input – e.g., arbitrary

Keystroke Biometric Studies Experimental Design and Data Collection

Keystroke Biometric Studies Experimental Results Identification Experimental Results Identification performance under ideal conditions (same keyboard type and input mode, leave-one-out procedure)

Keystroke Biometric Studies Experimental Results System hierarchical model and parameters Identification accuracy versus enrollment samples

Keystroke Biometric Studies Experimental Results System hierarchical model and parameters Distributions of “u” duration times for each entry mode

Keystroke Biometric Studies Conclusions Results are important and timely as more people become involved in the applications of interest Authenticating online test-takers Identifying senders of inappropriate High performance (accuracy) results if 2 or more enrollment samples/user Users use same keyboard type