DARPA-BAA-12-06 Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.

Slides:



Advertisements
Similar presentations
KeTra.
Advertisements

Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Biometric Data Mining “A Data Mining Study of Mouse Movement, Stylometry, and Keystroke Biometric Data” Clara Eusebi, Cosmin Gilga, Deepa John, Andre Maisonave.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Stylometry System CSIS Stylometry System – Use Cases and Feasibility Study Gregory Shalhoub, Robin Simon, Jayendra Tailor, Ramesh Iyer, Dr. Sandra Westcott.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Team Members: Ana Caicedo Escobar Sandeep Indukuri Deepthi Tulasi Kevin Chan Under Esteemed Guidance of: Prof. Charles C Tappert Robert Zack.
Robert S. Zack May 8, 2010 METHODS OF DERIVING BIOMETRIC ROC CURVES FROM THE k-NN CLASSIFIER.
SeethaRam Janapala, Shiladitya Roy, Jackson John, Luca Columbu, Joseph Carrozza, Robert Zack, and Charles Tappert REFACTORING A KEYSTROKE BIOMETRIC SYSTEM.
Pattern Recognition: Neural Networks & Other Methods
 Hamed Sadeghi Neshat.  With Internet delivery of video content surging to an unprecedented level, video advertising is becoming increasingly pervasive.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Lecture Exam Monday, March 27th 5:30 – 6:30 l bring a blue bubble sheet l lab sections 10, 11, 12 take test in Classroom Building 302 l lab sections 13,
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Thumbs Up for Security Thumbs Up for Security Overview Dr. Charles Tappert (
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
User Profiling for Intrusion Detection in Windows NT Tom Goldring R23.
Introduction to Pattern Recognition Charles Tappert Seidenberg School of CSIS, Pace University.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Practical Research by Leedy and Ormrod 10th Edition
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Int. Conf. e-Learning 2011 Project Management and Assessment of Distributed Teams in an Online Capstone Masters-Level Information Technology Course Charles.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Introduction University of Sunderland CIT304 Harry R Erwin, PhD.
Technical Writing 1ST Lecture.
IBIS-Admin New Mexico’s Web-based, Public Health Indicator, Content Management System.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Spokane’s Data Tools March 7, 2014 Corey Turner
Beyond Nouns Exploiting Preposition and Comparative adjectives for learning visual classifiers.
Research Seminar 1 Review Traditional Dissertation Process Chuck Tappert.
Center for Identification Technology Research (CITeR) An NSF Industry University Cooperative Research Center Automated Attendance and Exam Systems Dr.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Report to the IEC TC100 AGS on Stage 0 Project on Accessibility May 20, 2009 Washington, DC (at the Consumer Electronics Association in Crystal City, Virginia)
Community Plan Implementation Training Training of Trainers LUNCH Community meeting Practice presentation process KLO presentations CBO presentations.
1 Review of Research Seminar 1 Assignments Charles C. Tappert Seidenberg School of CSIS, Pace University.
1 Research Seminar 1 & 2 Overview Research Seminar 1 Assignments Charles C. Tappert Seidenberg School of CSIS, Pace University.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
11 Thoughts on STS regarding Machine Reading Ralph Weischedel 12 March 2012.
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Computer-User-Input Behavioral Biometrics Dr. Charles C
Presented by Khawar Shakeel
Keystroke Biometric Studies
Access control techniques
ISO Smart and Sustainable Cities developments
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
TA1| Northwestern University, LGS Innovations, University of Delaware| Real-Time Detection and Situational-Aware Analysis of Internet-Scale Heterogeneous.
Introduction to Pattern Recognition and Machine Learning
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
Evaluation of a Stylometry System on Various Length Portions of Books
ISO Smart and Sustainable Cities developments
Seidenberg’s Key Areas of Expertise
Computer-User-Input Behavioral Biometrics Dr. Charles C
Presentation transcript:

DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman

DARPA – Active Authentication DARPA Proposal 2012 Request for Proposal (RFP) c f0276fc1b28817c581d86&tab=core&_cview=0 c f0276fc1b28817c581d86&tab=core&_cview=0 Proposal Due March 6, 2012 Work Duration: 4/1/12 - 3/31/13 Continuations possible Perks – we are applying for 3-4 DPS half tuitions (start with half tuitions per semester) 2 Masters half tuitions

DARPA – Active Authentication Active Authentication Gov’t wants to continually authenticate all users of gov’t desktop computers Objective – detect intruders (unauthorized users) of gov’t machines Continual authentication – ongoing but with possible interruptions in contrast to continuous authentication which would mean without interruption

DARPA – Active Authentication Proposed Technologies Keystroke/Mouse Biometrics Unconscious level: ballistic motor control Stylometry Linguistic level: character, word, syntax Intentional Behavior Semantic level

DARPA – Active Authentication DPS Keystroke Biometric Dissertations 1. Long-text keystroke biometric applications over the Internet Dr. Mary Curtin, Keystroke biometric recognition studies on long text input Dr. Mary Villani, Strategies for managing missing and incomplete information Dr. Mark Ritzmann, An improved kNN classifier with appl to keystroke bio authentication Dr. Robert Zack, An investigation of keystroke and stylometry traits John Stewart (in progress, almost done - manuscript being reviewed) 6. Keystroke biometric intrusion detection Ned Bakelman (in progress)

DARPA – Active Authentication Possible DPS Dissertation Problems (in order of recommended priority) 1. New or improved biometric systems Keystroke/mouse biometric system (motor control level) Stylometry biometric system (char/word/syntax linguistic level) Intruder operational behavior biometric system (semantic level) 2. Dichotomy model – weak versus strong training For large populations we can’t train system on all users 3. Continual training of the biometric systems Continual training – how often?, measure performance Explore methods – e.g., give more weight to recent training data 4. Weak biometrics (mouse, stylometry) assist strong ones (keystroke) Clustering method suggested 5. Evaluate setting ROC-curve operating point for individual users to explicitly control individual risk mitigation