Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer-User-Input Behavioral Biometrics Dr. Charles C

Similar presentations


Presentation on theme: "Computer-User-Input Behavioral Biometrics Dr. Charles C"— Presentation transcript:

1 Computer-User-Input Behavioral Biometrics Dr. Charles C
Computer-User-Input Behavioral Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University Subtitle GenCyber Cybersecurity Workshop at Pace University

2 Cybersecurity Affects Governments, Companies, and even Individuals
Cybersecurity Threats 2018 Cyber Security, Terrorism, and Beyond How the Internet of Things (IoT) Is Changing the Cybersecurity Landscape How Cyber Attacks Affect Individuals and How You can Help Keep them Safe Russian interference in the 2016 United States elections Cyberwarfare by Russia U.S., Britain blame Russia for global cyber attack U.S.-U.K. Warning on Cyberattacks Includes Private Homes List of data breaches and cyber attacks in March 2018

3 University Research and Projects in Cybersecurity
University research and projects are typically on a considerably smaller scale than those undertaken by governments and companies However, there are some areas of cybersecurity where universities can make contributions In the area of biometrics we focus at Pace University on the less-studied biometrics because they have not been as extensively explored as the well-known biometrics One of these areas is computer-user-input behavioral biometrics

4 What are Computer-User-Input Behavioral Biometrics
Authentication or identification of individuals based on the unique way they interact with computer devices With desktop/laptop computers, it is the way people input text (motor control of keystroke input), the words and syntax they use (stylometry), the intent (semantics) of the input, as well as the way they move a mouse With smartphones, and to some extent tablets, it concerns all of the above, and everything from how the user holds the phone to how they swipe the screen to which keyboard or gestural shortcuts they use Of the various biometrics we focus on these at Pace University because they have not been as extensively studied as the well-known biometrics

5 Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users
DARPA: Active Authentication – DoD wants to continually authenticate all gov’t computer users Phase 1: 2010 and 2012 – authenticate users on desktops/laptops Phase 2: 2013 and 2015 – authenticate users on mobile devices Phase 3: implementation DARPA: Enhanced Attribution – DoD wants technology to attribute actions in cyberspace to individuals – network behavior and activity tracking of individuals, fusing generated data for predictive analysis

6 Importance of Computer-Input Biometrics to Identify or Authenticate Computer Users
U.S. Higher Education Opportunity Act of 2008 Concerns authentication of students taking online tests Universities are using more online courses Requires institutions of higher learning to adopt new identification technologies as they become available To assure students of record are those accessing the systems and taking the exams in online courses

7 Attribution and Intrusion Detection Plan Multi-biometric System
Motor control level – keystroke + mouse movement Linguistic level – stylometry (char, word, syntax) Semantic level – target likely intruder commands Intruder Keystroke + Mouse Stylometry Motor Control Level Linguistic Semantic

8 Keystroke Biometrics Based on idea that generated patterns are unique to individuals and difficult to duplicate Appeal of keystroke over other biometrics Not intrusive, inexpensive, continual user verification The keystroke biometric is one of the less-studied behavioral biometrics

9 Pace Univ. Keystroke Biometric Studies
Most literature studies have been on short input of a few seconds Commercial products on hardening passwords Pace University studies on desktop/laptop mechanical keyboards Short input of few seconds Vinnie Monaco, now at ARL, entered 2016 contest: we have World’s Best System Phone number – similar to CMU study (Ned Bakelman and Vinnie Monaco) Long text input of several minutes Online test taking (Mary Villani, John Stewart, Vinnie Monaco, Steve Kim) Impaired users – left hand, right hand, and both hands input (Gonzalo Perez) Pace University studies on mobile device touchscreens Numeric input – phone # – similar to CMU study (Mike Coakley) Features – pressure & location/area of finger press on keys, acceleration & gyroscope information Names are doctoral students

10 Mouse Movement and Stylometry Traits

11 Pace Univ. Mouse & Stylometry Studies
Combining keystroke/stylometry info: John Stewart Stylometry can compliment keystroke analysis The correct student may be keying in the test answers provided by a coach, with the student merely typing the coach’s words This would not be discovered via keystroke analysis But potentially could through stylometry analysis Stylometry analysis of Facebook postings Dissertation study by Jenny Li

12 Interesting Related Videos
IBM Trusteer Car Driving Biometric (2 min) The Five Most Dangerous New Attack Techniques – RSA Conf 2018 (44 min) Remarks by Secretary of Department Homeland Security – RSA Conf 2018 (35 min) Other Keynote presentations – RSA Conf RSA A View of the Future of CyberSecurity – RSA Conf 2017 (2 min) Kahn Academy Cybersecurity 101 Another keystroke biometric demo

13 Pace Univ. Research Day Conference
Brain Signal Biometrics with Virtual Reality Human-Computer Interaction with Virtual Reality using Brain Signals Computing Index of Difficulty Measurement for Handedness in Human Computer Interaction Drunk Driving Prevention Application Using Modern Techniques 2018 Research Day Conference Analyzing Expert Cybersecurity Twitter Accounts by Using Thesaurus Methods for Text Analytics 2017 Research Day Conference – stylometry examples below The Correlation between the Topic and Emotion of Tweets through Machine Learning Sentiment Analysis of Twitter Messages Using Word2Vec

14 Copyright for Material Reuse
These materials are developed with support from the GenCyber program of the National Security Agency and the CyberCorps program of the National Science Foundation. Copyright © 2019 Charles Tappert Pace University. Please properly acknowledge the source for any reuse of the materials as below. Charles Tappert, 2019 GenCyber Cybersecurity Workshop, Pace University Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation. A copy of the license is available at

15 Acknowledgment The author(s) would like to acknowledge the support from the National Security Agency and the National Science Foundation under Grant No. H Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Security Agency, National Science Foundation or the U.S. government.


Download ppt "Computer-User-Input Behavioral Biometrics Dr. Charles C"

Similar presentations


Ads by Google