SlideShare a Scribd company logo
Keystroke dynamics support for
authentication mechanism
By
Mayank Sachan
12/4/2017 1
Presentation on
Outline
 Introduction
 Literature survey
 Types of authentication
 Keystroke Verification Techniques
 Approaches of keystroke biometric system
– Keystroke features
– Anomaly detection and accuracy measures
 Keystroke dynamics Phase
 System Architecture
 Implementation
 Experiment Result
 Conclusion
 Comments
2
Biometrics
Biometrics measure physical or behavioral characteristics of
an individual.
– Physical (do not change over time):
– Fingerprint, iris pattern, hand geometry
– Behavioral (may change over time):
– Signature, speech pattern, keystroke pattern
12/4/2017 3
Keystroke biometrics
 A keystroke dynamic is based on the assumption that each person has a
unique keystroke rhythm.
 Keystroke features are:
– Latency between keystrokes.
– Duration of key presses.
12/4/2017 4
Literature survey
 There have been many survey works on this topic.
 In 2004, A. Peacock et al evaluated Keystroke Dynamics system based on classifiers accuracy,
usability and privacy.[12]
 In 2010, H. Crawford found the high quality of result from different research that obtain by neural
network. This study recommend that not use same participant in authorized and unauthorized users
when evaluating system performance.[11]
 In 2012, S.P Banarjee compared different algorithms in the survey and explicitly discuss the factor that
affect the performance. [9]
Literature survey cont..
 In 2013, The et al. claimed that Keystroke Dynamics is unlikely to replace existing authentication
mechanism . They concluded that some properties, such as the ability to operate in stealth mode, low
cost, high user acceptance, and ease of integration with existing security systems, made KD
promising.[10]
Three types of authentication
By authentication we mean verifying a claimed identity.
Something you know.
• A password
 Something you have.
• An ID card or badge
 Something you are.
• Biometrics
12/4/2017 7
User Authentication Approaches
12/4/2017 8
Figure : 1 User Authentication Approach
Keystroke Verification Techniques
 Static verification (Fixed text mode)
• Only based on password typing rhythm
• Authentication only at login time
 Dynamic verification (free text mode)
• Pattern regardless of the typed text
• A continuous or periodic monitoring (On-the-fly user authentication)
• Not required to memorize a predetermined text (username & password)
12/4/2017 9
12/4/2017 10
Figure 2 : Example for online exam
Currently, there are 4 primary methods for user authentication:
• Knowledge factors, or something unique that the user knows.(Username & Password)
• Ownership factors, or something unique that the user has. (ID)
• Something unique that the user is.(Photographs)
• Something unique that the user does.(Behaviour)
Continuous Biometric User Authentication (Dynamic) :
Keystroke dynamics features (Matrix)
12/4/2017 11
Hold Time :
Up Up Time :
Down Down Time
Keystroke dynamics features (Matrix) Cont..
12/4/2017 12
Down Up Time :
Up Down Time :
Anomaly detection techniques (Cont …)
12/4/2017 14
Anomaly detection techniques (Cont …)
12/4/2017 15
Anomaly detection techniques
12/4/2017 16
Classification accuracy measures :
FRR : False rejection rate
•FRR decreases with the higher threshold .
FAR : False acceptance rate
•FAR increases with higher threshold .
ERR : Equal error rate
FRR = FAR
•Threshold can be chosen based on EER
Figure 3 : Threshold calculation
Keystroke dynamics phases
12/4/2017 17
Keystroke dynamics has two phases :
Enrollment
•Capture
•Extraction
•Preprocessing extracted features
•Storing
Authentication
•Enroll
•Comparison
•Match/non-match
System Architecture
12/4/2017 18
Figure 4 : System architecture
When user inter first time , user get register
Figure 5 : UI for the data collection
Implementation
After entering text and re-enter text
Figure 6 : Algorithms graph
12/4/2017 21
Evaluation Matrix
Figure 7 : Evaluation Matrix
Evaluation Table
12/4/2017 22
Figure 8 : Evaluation Table
Input Data
Figure 7 : Input data table
Result
12/4/2017 24
Figure 8 : EER of different parameter with different anomaly techniques
Result (Cont…)
12/4/2017 25
Figure 9 : Hold parameter for same password with different user
Result (Cont…)
12/4/2017 26
Figure 10 : One user attempts for the same password using different feature and classifiers
12/4/2017 27
Figure 11 : Analysis for the genuine user with successful login
12/4/2017 28
Figure 12 :False accepted user
12/4/2017 29
Figure 12 :False rejected genuin user
12/4/2017 30Figure 12 : Equal error rate for gaussian
Conclusion
 Got the .425 EER with Manhattan standard deviation for Down Up parameter,
Mahalanobis for Hold, Up Up, Down Up parameters and Z-score for Up Up
parameters.
 For the Gaussian classification, the Up Down and Down Up time intervals give
better results.
 In the experiment, Up Up feature gives ~70% accuracy.
12/4/2017 31
Some Opportunities:
 Login information
– Computer
– Cell phones
– Automated Teller Machine
– Digital telephone dial
– Digital electronic security keypad at a building entrance
 Continuous authentication
– Online examination
12/4/2017 32
Advantages of keystroke dynamics
 Software Only method. (No Additional Hardware except a Keyboard)
 Simple To Deploy and Use (username & passwords) – Universally accepted
 Unobtrusive, Non-Invasive, Cost Effective
 No End-User Training
 It provides a simple natural way for increased computer security
 Can be used over the internet
12/4/2017 33
Keystroke drawbacks
 User’s susceptibility to fatigue
 Dynamic change in typing patterns
 Injury, skill of the user
 Change of keyboard hardware.
12/4/2017 34
REFERENCES
[1] Alaa Darabseh, Akbar Siami Namin ,“Effective User Authentications Using Keystroke Dynamics Based on
Feature Selections ”, IEEE 14th International Conference on Machine Learning and Applications, 2015.
[2] Alaa Darabseh , Akbar Siami Namin ,“On Accuracy of Classification-based Keystroke Dynamics for
Continuous User Authentication” , International Conference on Cyberworlds, 2015 .
[3] Soumen Roy, Utpal Roy, D.D. Sinha,“Free-text User Authentication Technique through Keystroke Dynamics ”,
High Performance Computing and Applications (ICHPCA), 2014 International Conference on.
[4] Shimaa I. Hassan, Mazen M. Selim, and Hala H. zayed, “User Authentication with Adaptive Keystroke
Dynamics ”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 2, July 2013.
[5] Fabian Monrose, Aviel D. Rubin, “Keystroke dynamics as a biometric for authentication”, Future Generation
Computer Systems 16 , March 1999.
[6] Daniele Gunetti, Claudia Picardi,“Keystroke Analysis of Free Text”, ACM Transactions on Information and
System Security, Vol. 8, No. 3, August 2005, Pages 312–347.
[7] Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafić, Ahmet Camtepe,
Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici , “Identity theft, computers and
behavioral biometrics”, Intelligence and Security Informatics, 2009. ISI '09. IEEE International Conference on.
[8] Pahuja, G.; Nagabhushan, T.N.,” Biometric authentication & identification through behavioral biometrics: A
survey” , Cognitive Computing and Information Processing (CCIP), 2015 International Conference on.
[9]S. Banerjee and D. Woodard. “Biometric Authentication and Identification using Keystroke Dynamics: A
Survey”. In: Journal of Pattern Recognition Research 7.1 (July 2012), pp. 116–139
[10] P. S. Teh, A. B. J. Teoh, and S. Yue. “A Survey of Keystroke Dynamics Biometrics”. In: The Scientific World
Journal 2013 (2013), pp. 1–24. DOI: 10.1155/2013/408280
[11] H. Crawford. “Keystroke dynamics: characteristics and opportunities”. In: Proceedings of the 8th International
Conference on Privacy, Security and Trust (PST 10). Aug. 2010, pp. 205–212.
[12] A. Peacock, X. Ke, and M. Wilkerson. “Typing patterns: a key to user identification”. In: IEEE Security and
Privacy 2.5 (2004), pp. 40–47.
Thank You
12/4/2017 38

More Related Content

What's hot

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
christywong1234
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
Leonardo Antichi
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
Piyush Mittal
 
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
Dheerendra k
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
Biometrics
BiometricsBiometrics
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
eSAT Journals
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
Swapnil Bangera
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
Mazin Alwaaly
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
Bhavi Bhatia
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
mahtabrasheed195
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
Drishty Sharma
 

What's hot (20)

Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometric
Biometric Biometric
Biometric
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 

Similar to Keystroke Dynamics Support For Authentication

Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
Editor IJCATR
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
Alexander Decker
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
Alexander Decker
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Evelyn Donaldson
 
Problem Password management has become a significant issue in the.docx
Problem Password management has become a significant issue in the.docxProblem Password management has become a significant issue in the.docx
Problem Password management has become a significant issue in the.docx
bkbk37
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
SarvaniShettigar
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
Shujun Li
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
 
GaitProjectProposal
GaitProjectProposalGaitProjectProposal
GaitProjectProposal
Vivek Kumar
 
J1802035460
J1802035460J1802035460
J1802035460
IOSR Journals
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
nuruladnan11
 

Similar to Keystroke Dynamics Support For Authentication (20)

Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...Graphical password based hybrid authentication system for smart hand held dev...
Graphical password based hybrid authentication system for smart hand held dev...
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
Problem Password management has become a significant issue in the.docx
Problem Password management has become a significant issue in the.docxProblem Password management has become a significant issue in the.docx
Problem Password management has become a significant issue in the.docx
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
GaitProjectProposal
GaitProjectProposalGaitProjectProposal
GaitProjectProposal
 
J1802035460
J1802035460J1802035460
J1802035460
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Data hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combinationData hiding in graphical password authentication using combination
Data hiding in graphical password authentication using combination
 

Recently uploaded

Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
bmucuha
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
facilitymanager11
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
slg6lamcq
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 

Recently uploaded (20)

Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
一比一原版(CU毕业证)卡尔顿大学毕业证如何办理
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
 
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
一比一原版南十字星大学毕业证(SCU毕业证书)学历如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 

Keystroke Dynamics Support For Authentication

  • 1. Keystroke dynamics support for authentication mechanism By Mayank Sachan 12/4/2017 1 Presentation on
  • 2. Outline  Introduction  Literature survey  Types of authentication  Keystroke Verification Techniques  Approaches of keystroke biometric system – Keystroke features – Anomaly detection and accuracy measures  Keystroke dynamics Phase  System Architecture  Implementation  Experiment Result  Conclusion  Comments 2
  • 3. Biometrics Biometrics measure physical or behavioral characteristics of an individual. – Physical (do not change over time): – Fingerprint, iris pattern, hand geometry – Behavioral (may change over time): – Signature, speech pattern, keystroke pattern 12/4/2017 3
  • 4. Keystroke biometrics  A keystroke dynamic is based on the assumption that each person has a unique keystroke rhythm.  Keystroke features are: – Latency between keystrokes. – Duration of key presses. 12/4/2017 4
  • 5. Literature survey  There have been many survey works on this topic.  In 2004, A. Peacock et al evaluated Keystroke Dynamics system based on classifiers accuracy, usability and privacy.[12]  In 2010, H. Crawford found the high quality of result from different research that obtain by neural network. This study recommend that not use same participant in authorized and unauthorized users when evaluating system performance.[11]  In 2012, S.P Banarjee compared different algorithms in the survey and explicitly discuss the factor that affect the performance. [9]
  • 6. Literature survey cont..  In 2013, The et al. claimed that Keystroke Dynamics is unlikely to replace existing authentication mechanism . They concluded that some properties, such as the ability to operate in stealth mode, low cost, high user acceptance, and ease of integration with existing security systems, made KD promising.[10]
  • 7. Three types of authentication By authentication we mean verifying a claimed identity. Something you know. • A password  Something you have. • An ID card or badge  Something you are. • Biometrics 12/4/2017 7
  • 8. User Authentication Approaches 12/4/2017 8 Figure : 1 User Authentication Approach
  • 9. Keystroke Verification Techniques  Static verification (Fixed text mode) • Only based on password typing rhythm • Authentication only at login time  Dynamic verification (free text mode) • Pattern regardless of the typed text • A continuous or periodic monitoring (On-the-fly user authentication) • Not required to memorize a predetermined text (username & password) 12/4/2017 9
  • 10. 12/4/2017 10 Figure 2 : Example for online exam Currently, there are 4 primary methods for user authentication: • Knowledge factors, or something unique that the user knows.(Username & Password) • Ownership factors, or something unique that the user has. (ID) • Something unique that the user is.(Photographs) • Something unique that the user does.(Behaviour) Continuous Biometric User Authentication (Dynamic) :
  • 11. Keystroke dynamics features (Matrix) 12/4/2017 11 Hold Time : Up Up Time : Down Down Time
  • 12. Keystroke dynamics features (Matrix) Cont.. 12/4/2017 12 Down Up Time : Up Down Time :
  • 13. Anomaly detection techniques (Cont …) 12/4/2017 14
  • 14. Anomaly detection techniques (Cont …) 12/4/2017 15
  • 15. Anomaly detection techniques 12/4/2017 16 Classification accuracy measures : FRR : False rejection rate •FRR decreases with the higher threshold . FAR : False acceptance rate •FAR increases with higher threshold . ERR : Equal error rate FRR = FAR •Threshold can be chosen based on EER Figure 3 : Threshold calculation
  • 16. Keystroke dynamics phases 12/4/2017 17 Keystroke dynamics has two phases : Enrollment •Capture •Extraction •Preprocessing extracted features •Storing Authentication •Enroll •Comparison •Match/non-match
  • 17. System Architecture 12/4/2017 18 Figure 4 : System architecture
  • 18. When user inter first time , user get register Figure 5 : UI for the data collection Implementation
  • 19. After entering text and re-enter text Figure 6 : Algorithms graph
  • 20. 12/4/2017 21 Evaluation Matrix Figure 7 : Evaluation Matrix
  • 21. Evaluation Table 12/4/2017 22 Figure 8 : Evaluation Table
  • 22. Input Data Figure 7 : Input data table
  • 23. Result 12/4/2017 24 Figure 8 : EER of different parameter with different anomaly techniques
  • 24. Result (Cont…) 12/4/2017 25 Figure 9 : Hold parameter for same password with different user
  • 25. Result (Cont…) 12/4/2017 26 Figure 10 : One user attempts for the same password using different feature and classifiers
  • 26. 12/4/2017 27 Figure 11 : Analysis for the genuine user with successful login
  • 27. 12/4/2017 28 Figure 12 :False accepted user
  • 28. 12/4/2017 29 Figure 12 :False rejected genuin user
  • 29. 12/4/2017 30Figure 12 : Equal error rate for gaussian
  • 30. Conclusion  Got the .425 EER with Manhattan standard deviation for Down Up parameter, Mahalanobis for Hold, Up Up, Down Up parameters and Z-score for Up Up parameters.  For the Gaussian classification, the Up Down and Down Up time intervals give better results.  In the experiment, Up Up feature gives ~70% accuracy. 12/4/2017 31
  • 31. Some Opportunities:  Login information – Computer – Cell phones – Automated Teller Machine – Digital telephone dial – Digital electronic security keypad at a building entrance  Continuous authentication – Online examination 12/4/2017 32
  • 32. Advantages of keystroke dynamics  Software Only method. (No Additional Hardware except a Keyboard)  Simple To Deploy and Use (username & passwords) – Universally accepted  Unobtrusive, Non-Invasive, Cost Effective  No End-User Training  It provides a simple natural way for increased computer security  Can be used over the internet 12/4/2017 33
  • 33. Keystroke drawbacks  User’s susceptibility to fatigue  Dynamic change in typing patterns  Injury, skill of the user  Change of keyboard hardware. 12/4/2017 34
  • 34. REFERENCES [1] Alaa Darabseh, Akbar Siami Namin ,“Effective User Authentications Using Keystroke Dynamics Based on Feature Selections ”, IEEE 14th International Conference on Machine Learning and Applications, 2015. [2] Alaa Darabseh , Akbar Siami Namin ,“On Accuracy of Classification-based Keystroke Dynamics for Continuous User Authentication” , International Conference on Cyberworlds, 2015 . [3] Soumen Roy, Utpal Roy, D.D. Sinha,“Free-text User Authentication Technique through Keystroke Dynamics ”, High Performance Computing and Applications (ICHPCA), 2014 International Conference on. [4] Shimaa I. Hassan, Mazen M. Selim, and Hala H. zayed, “User Authentication with Adaptive Keystroke Dynamics ”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 2, July 2013. [5] Fabian Monrose, Aviel D. Rubin, “Keystroke dynamics as a biometric for authentication”, Future Generation Computer Systems 16 , March 1999.
  • 35. [6] Daniele Gunetti, Claudia Picardi,“Keystroke Analysis of Free Text”, ACM Transactions on Information and System Security, Vol. 8, No. 3, August 2005, Pages 312–347. [7] Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafić, Ahmet Camtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller, Lior Rokach, Yuval Elovici , “Identity theft, computers and behavioral biometrics”, Intelligence and Security Informatics, 2009. ISI '09. IEEE International Conference on. [8] Pahuja, G.; Nagabhushan, T.N.,” Biometric authentication & identification through behavioral biometrics: A survey” , Cognitive Computing and Information Processing (CCIP), 2015 International Conference on. [9]S. Banerjee and D. Woodard. “Biometric Authentication and Identification using Keystroke Dynamics: A Survey”. In: Journal of Pattern Recognition Research 7.1 (July 2012), pp. 116–139
  • 36. [10] P. S. Teh, A. B. J. Teoh, and S. Yue. “A Survey of Keystroke Dynamics Biometrics”. In: The Scientific World Journal 2013 (2013), pp. 1–24. DOI: 10.1155/2013/408280 [11] H. Crawford. “Keystroke dynamics: characteristics and opportunities”. In: Proceedings of the 8th International Conference on Privacy, Security and Trust (PST 10). Aug. 2010, pp. 205–212. [12] A. Peacock, X. Ke, and M. Wilkerson. “Typing patterns: a key to user identification”. In: IEEE Security and Privacy 2.5 (2004), pp. 40–47.