I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.

Slides:



Advertisements
Similar presentations
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Advertisements

BIOMETRICS Presented By Rickie Jackson.  Outline –Introduction –Biometrics techniques –Strengths, and weaknesses –FAR/FRR –Major Players –Summary.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Behavior-based Authentication Systems
USign—A Security Enhanced Electronic Consent Model Yanyan Li 1 Mengjun Xie 1 Jiang Bian 2 1 University of Arkansas at Little Rock 2 University of Arkansas.
Biometrics.
Designing a Multi-Biometric System to Fuse Classification Output of Several Pace University Biometric Systems Leigh Anne Clevenger, Laura Davis, Paola.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
CS Team 5 Alex Wong Raheel Khan Rumeiz Hasseem Swati Bharati Biometric Authentication System.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Biometric ROC Curves Methods of Deriving Biometric Receiver Operating Characteristic Curves from the Nearest Neighbor Classifier Robert Zack dissertation.
Biometrics and Authentication Shivani Kirubanandan.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Keystroke Dynamics Jarmo Ilonen. Structure of presentation Introduction Keystroke dynamics for Verification Identification Commercial system: BioPassword.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By: Navid Bahrani, Niloufar Azmi, Majid Mafi
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Designing multiple biometric systems: Measure of ensemble effectiveness Allen Tang NTUIM.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
PRESENTATION ON BIOMETRICS
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Keystroke Dynamics By Hafez Barghouthi.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
Lecture 7 Constructing hypotheses
FACE RECOGNITION TECHNOLOGY
Network Security Unit-VI
Seminar Presentation on Biometrics
Multi-Biometrics: Fusing At The Classification Output Level Using Keystroke and Mouse Motion Features Todd Breuer, Paola Garcia Cardenas, Anu George, Hung.
Presentation Outlines
Anindya Maiti, Murtuza Jadliwala, Jibo He Igor Bilogrevic
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen

Outline Introduction Keystroke biometrics Experimental Design Experimental Results Conclusion

Authentication using Biometrics Physiological biometric: – facial features – hand geometry – Fingerprints – iris scans Behavioral biometric: – Signatures – Handwriting – Typing patterns ( i.e. keystroke dynamics )

Is Keystroke Biometrics Unique? If imitation is possible, then keystroke dynamics would be unsuitable for use as a biometrics feature. it is possible to imitate someone else’s keystroke typing if appropriate feedback is provided?

Keystroke Dynamics Keystroke dynamics refer to information about the typing pattern. pressing and releasing of a keystroke pair (ka, kb) results in 4 timings which are of interest to keystroke biometrics systems

Keystroke Dynamics Key-down time: Key-up time: four relative timings can be derived:

Data vectorization

Anomaly Detector Scoring mean vector

Anomaly Detector Scoring absolute deviation vector

Anomaly Detector Scoring Euclidean distance based anomaly score Manhattan distance based anomaly score

Anomaly Detection Threshold FRR: false rejection rate, decrease as threshold sets higher FAR: false acceptance rate, increase as threshold sets higher EER: equal error rate where FRR=FAR

Experiment Design Attack scenarios – the attacker is able to extract the victim pattern from a compromised biometrics database. – the attacker may be able to capture samples of the victim’s keystrokes as she is authenticating (e.g. by installing a key- logger).

Choice of Password “serndele” – minimize finger movements on a standard US keyboard. “ths.ouR2” – chosen to maximize finger movements and therefore difficulty of typing.

Experiment 1 (e1) Training Data Collection 88 participants were asked to submit 200 samples for each of the two passwords using an existing keystroke dynamics based authentication system.

Experiment 2 (e2) Imitation using Euclidean distance 30 minutes imitation task: 84 participants played the role of attackers. 10 victims were randomly chosen from e1. Each attacker was randomly assigned one of the 10 victims, and was given the victim’s mean vector for. Attackers gets real-time feedback of the Euclidean distance based anomaly score.

Experiment 3 (e3a) Investigate the additional imitation session with Euclidean distance 14 best attackers were chosen from e2 to perform the same imitation task in e2 for only 20 minutes.

Experiment 4 (e3b) Investigate the imitation performance of highly motivated attackers in optimal environment Feedback is based on full victim typing pattern Information (Manhattan distance and absolute deviation)

Feedback Interface: Mimesis

Experiment Results Result from e1: collision attack given a target organization with 10 high value targets, if a team of 84 attackers were to be assembled, we expect to find on average, one attacker with the same typing pattern as one of the high value targets.

Experiment Results Results from e2: Improvement in FAR after imitation training

Experiment Results Results from e2: Effect of password difficulty The differences in mean between the easier and the harder password suggest that passwords that are easier to type are also easier to imitate.

Experiment Results Results from e2: effect of training duration 56% attackers took no more than 20 minutes to reach their b20 performance.

Experiment Results Results from e3a: – 6 attackers improved their b20 FAR – 4 attackers unchanged – 4 attackers worsened

Experiment Results Results from e3b:

Experiment Results Factors affecting imitation outcome – Gender: male performs significantly better than females – Therefore there exists a weak correlation between the imitation outcome and the similarity between the attacker and victim’s typing pattern – Typing speed, keyboard, Number of trials per minute are not affecting factors

Conclusion A user’s typing pattern can be imitated – Trained with incomplete model of the victim’s typing pattern, an attacker’s success rate is around 0.52 – The best attacker increases FAR to 1 after training – When the number of attackers and victims are sizeable, chance of natural collision is significant

Conclusion Easier passwords are easily imitated Males are better imitators

Questions?