Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
TAILS: COBWEB 1 [1] Online Digital Learning Environment for Conceptual Clustering This material is based upon work supported by the National Science Foundation.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr. Charles Tappert.
T EAMS 2 & 4 R ESEARCH D AY P RESENTATION P RESENTERS T EAMS 2 & 4 T HE M ICHAEL L. G ARGANO 9 TH A NNUAL R ESEARCH D AY P RESENTATION P RESENTERS E DYTA.
Long Text Keystroke Biometrics Study Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana Sung-Hyuk Cha, Charles Tappert (Software Engineering Project.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Ned Bakelman Advisor: Dr. Charles Tappert Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection.
Thumbs Up for Security Thumbs Up for Security Overview Dr. Charles Tappert (
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe the problem being investigated Build a case.
Keystroke Biometric Identification and Authentication on Long-Text Input Summary of eight years of research in this area Charles Tappert Seidenberg School.
2015 GenCyber Cybersecurity Workshop Mobile Phone SecurityJuly 10, 2015 Design and User Acceptability Testing of Secure Mobile Phone Authentication Mechanism.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
DARPA-BAA Proposal 2012 Active Authentication Technical POC: Dr. Charles Tappert Principal Investigators: Drs. Tappert, Cha, Chen, Grossman.
BRAIN: Brain Research through Advancing Innovative Neurotechnologies Announced by President Obama in February 2013 as part of FY 2014 Budget Request to.
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
SUBTITLE 2015 GenCyber Cybersecurity Workshop In-class Exercise: Components of Cybersecurity Andreea Cotoranu, Vinnie Monaco, and Chuck Tappert Seidenberg.
This material is based upon work supported by the National Science Foundation under Grant No , and Any opinions, findings, and.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Keystroke Biometrics Studies on a Variety of Short and Long Text and Numeric Input Ned Bakelman, DPS Candidate Charles C. Tappert, PhD, Advisor Seidenberg.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Numerical Methods Continuous Fourier Series Part: Continuous Fourier Series
You’re Leaving Footprints TROPE: Teachers’ Resources for Online Privacy Education 1.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Numerical Methods Multidimensional Gradient Methods in Optimization- Example
Long-Text Keystroke Biometric Applications over the Internet Gary Bartolacci, Mary Curtin, Marc Katzenberg, Ngozi Nwana, Sung-Hyuk Cha, and Charles Tappert.
Today’s Session Introduction Overview of Biometrics Dr. Charles C
A device tat transfers data from the outside world into a computer
Computer-User-Input Behavioral Biometrics Dr. Charles C
Biometric Security Technology Acceptance Study
Keystroke Biometric Studies
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
3.6 Fundamentals of cyber security
Authentication.
Doctor of Professional Studies Orientation
Lesson 3 Standard Methods of Input.
Discussion and Conclusion
Chapter 5 - Input.
IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION
Keystroke Biometric Authentication on Smartphones Using Short Numeric Input Greg: Our project covers the topic of Keystroke Biometric Authentication, which.
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Elliptic Partial Differential Equations – Direct Method
Lesson Title: Reader Architecture and Antenna Configurations
Navigation Aid for the Blind
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric System
CS691-CS692-IT691 Capstone Projects Course
Title of session For Event Plus Presenters 12/5/2018.
Evaluation of a Stylometry System on Various Length Portions of Books
Black Box Software Testing Fall 2005 Overview – Part 1 of 3
Elliptic Partial Differential Equations – Gauss-Seidel Method
Numerical Methods Newton’s Method for One -Dimensional Optimization - Example
Autotroph heterotroph.
Seidenberg’s Key Areas of Expertise
CS691-CS692-IT691 Capstone Projects Course
Human Computer Interaction Lecture 24 Cognitive Models
Doctor of Professional Studies Orientation Revisited
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
CS691-CS692-IT691 Capstone Projects Course
Computer-User-Input Behavioral Biometrics Dr. Charles C
Keystroke Biometric Studies with Short Numeric Input on Smartphones
Presentation transcript:

Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University http://csis.pace.edu/~ctappert/ Subtitle GenCyber Cybersecurity Workshop at Pace University

Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users DARPA: Active Authentication – DoD wants to continually authenticate all gov’t computer users Phase 1: 2010 and 2012 – authenticate users on desktops/laptops Phase 2: 2013 and 2015 – authenticate users on mobile devices DARPA: Enhanced Attribution – DoD wants technology to attribute actions in cyberspace to individuals 2016-2020 – network behavior and activity tracking of individuals, fusing generated data for predictive analysis

Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users U.S. Higher Education Opportunity Act of 2008 Concerns authentication of students taking online tests Universities are using more online courses Requires institutions of higher learning to adopt new identification technologies as they become available To assure students of record are those accessing the systems and taking the exams in online courses

Attribution and Intrusion Detection Plan Multi-biometric System Motor control level – keystroke + mouse movement Linguistic level – stylometry (char, word, syntax) Semantic level – target likely intruder commands Intruder Keystroke + Mouse Stylometry Motor Control Level Linguistic Semantic

Keystroke Biometrics Based on idea that generated patterns are unique to individuals and difficult to duplicate Appeal of keystroke over other biometrics Not intrusive, inexpensive, continual user verification The keystroke biometric is one of the less-studied behavioral biometrics

Pace Univ. Keystroke Biometric Studies Most literature studies have been on short input of a few seconds Commercial products on hardening passwords Pace University studies on desktop/laptop mechanical keyboards Short input of few seconds Vinnie Monaco, now at ARL, entered 2016 contest: we have World’s Best System Phone number – similar to CMU study (Ned Bakelman and Vinnie Monaco) Long text input of several minutes Online test taking (Mary Villani, John Stewart, Vinnie Monaco, Steve Kim) Impaired users – left hand, right hand, and both hands input (Gonzalo Perez) Pace University studies on mobile device touchscreens Numeric input – phone # – similar to CMU study (Mike Coakley) Features – pressure & location/area of finger press on keys, acceleration & gyroscope information Names are doctoral students

Mouse Movement and Stylometry Traits

Pace Univ. Mouse & Stylometry Studies Combining keystroke/stylometry info: John Stewart Stylometry can compliment keystroke analysis The correct student may be keying in the test answers provided by a coach, with the student merely typing the coach’s words This would not be discovered via keystroke analysis But potentially could through stylometry analysis Stylometry analysis of Facebook postings Dissertation study by Jenny Li

Copyright for Material Reuse This materials are developed under the support of the GenCyber program of the National Security Agency and the CyberCorps program of the National Science Foundation. Copyright© 2016 Charles Tappert (ctappert@pace.edu), Pace University. Please properly acknowledge the source for any reuse of the materials as below. Charles Tappert, 2016 GenCyber Cybersecurity Workshop, Pace University Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation. A copy of the license is available at http://www.gnu.org/copyleft/fdl.html.

Acknowledgment The authors would like to acknowledge the support from the GenCyber program of the National Security Agency and the CyberCorps program of the National Science Foundation. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, the National Security Agency or the U.S. government.