Keystroke Dynamics By Hafez Barghouthi.

Slides:



Advertisements
Similar presentations
CS7026 jQuery Events. What are Events?  jQuery is tailor-made to respond to events in an HTML page.  Events are actions that can be detected by your.
Advertisements

Department of Labor HSPD-12
Behavior-based Authentication Systems
Non-Text Passwords CRyptography Applications Bistro Jessica Greer February 12, 2004.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Modeling an Intelligent Continuous Authentication System to Protect Financial Information Resources Thomas G. Calderon Akhilesh Chandra John J. Cheh The.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Keystroke Biometrics Study Software Engineering Project Team + DPS Student.
Introduction to Fingerprint Biometrics By Tamar Bar.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
Keystroke Dynamics Jarmo Ilonen. Structure of presentation Introduction Keystroke dynamics for Verification Identification Commercial system: BioPassword.
New Interaction Techniques Department of Computer Sciences University of Tampere, Finland September – December, 2003 Grigori Evreinov
Marjie Rodrigues
Security-Authentication
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
By: Navid Bahrani, Niloufar Azmi, Majid Mafi
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Selim Akyokus AIA /2/ AIA 2007 ENHANCED PASSWORD AUTENTICATION THROUGH KEYSTROKE TYPING CHARACTERISTICS Ozlem Guven(1), Selim Akyokus(1),
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Behavioral Biometrics October 10, 2005.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Authentication Training Guide 1 The Red Flag Ruling requires automotive dealerships to detect red flags that are applicable to their operation. After.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Biometrics Authentication Technology
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Chapter 10 Defining Classes. The Internal Structure of Classes and Objects Object – collection of data and operations, in which the data can be accessed.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
G53SEC 1 Authentication and Identification Who? What? Where?
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Login session using mouse biometrics A static authentication proposal using mouse biometrics Christopher Johnsrud Fullu 2008.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Ronald E. McNair Internship Experience By: Lemonteh’ Horne.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.
Clickprints on the Web: Are there Signatures in Web Browsing Data?
Authentication and Account Management
Access control techniques
Authentication.
Keystroke Biometric Authentication on Smartphones Using Short Numeric Input Greg: Our project covers the topic of Keystroke Biometric Authentication, which.
Seminar Presentation on Biometrics
Operating Systems Security
A SEMINAR REPORT ON BIOMETRICS
Dynamic Authentication of Typing Patterns
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Keystroke Dynamics By Hafez Barghouthi

Keystroke dynamics Keystroke dynamics is the process of analyzing the way a user types on a keyboard and identify him based on his habitual typing rhythm •A user’s typing pattern may be unique because similar neuro-physiological factors that make written signatures unique are also exhibited here •Keystroke dynamics is a behavioral biometric •Natural choice for computer login and network security

History World War II Telegraph operators on many U.S. ships could recognize the sending operator "Fist of the Sender" the uniqueness in the keying rhythm (even of Morse-code), could distinguish one operator from another. http://www.wsta.org/publications/articles/1003_article06.html

State of Art •Keystroke dynamics is not what you type, but how you type •Features commonly used to describe a user’s typing pattern are Latencies between successive keystrokes (the elapsed time between the release of the first key and the depression of the second). Duration of each keystroke (How long is the key held down). Finger placement. Pressure applied on the keys . Overall typing speed. For known regularly-typed strings (e.g., username and password), such features are quite consistent However, features are a function of the user and the environment

State Of Art-2 Static vs. Continuous •In static verification, the keystrokes are analyzed only at specific times e.g., during login. •Static approaches provide more robust user verification than simple passwords. •But static methods do not provide continuous security –they cannot detect substitution of the user after the initial verification. •Continuous verification monitors the user’s typing behavior throughout the session; can be used to detect uncharacteristic typing rhythm caused by say drowsiness. Monrose and Rubin, “Keystroke dynamics as biometrics for authentication”, Future Generation Computer Systems 16 (2000), 351-359.

Features Collected data is structure with 3 fields: Type: KeyDown (press down) or KeyUp (release) Time: Time (in seconds) when the key is pressed down or released Value: What key is pressed

Latency and duration KeyDown T1 A KeyUp T2 A KeyDown T3 B KeyUp T4 B

Latency and duration-2 DURA = (T2-T1) LATAB = (T3-T2) DURB = (T4-T3)

Latency and duration -3 Duration: Latency: Always positive N values Can be negative (e.g. when using the Shift Key)! (N-1) values

Keystroke: Open issues Different languages Different applications Word, C#, email, web Optimal cost function Choice between general / personal template Use of mouse.