170 likes | 504 Views
Keystroke Dynamics. Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010. Agenda. Introduction Data Sets / Techniques Algorithms Performance Conclusions Q & A. Introduction.
E N D
Keystroke Dynamics Etem DENİZ, Buğra KOCATÜRK, Gülşah YILDIZOĞLU, Ömer UZUN Boğaziçi University, CMPE, May 2010
Agenda Introduction Data Sets / Techniques Algorithms Performance Conclusions Q & A
Introduction Keystroke, a developing biometric technique for user authentication Secure system because different typing rhythms Keystroke terms, latency, keystroke dynamics, click patterns Only using keystroke dynamics loses effectiveness Neural networks, k-nearest neighbor algorithm, Manhattan(scaled), pattern classification methods totrain system
Data Sets / Techniques H.t = t₂ - t₁UD.t.e = t₃ - t₂DD.t .e = t₃ - t₁ t e s t t₁ t₈ t₂ t₄ t₅ t₆ t₇ t₃ hold time up-down latency down-down latency
Algorithms Manhattan (scaled) Nearest Neighbor Neural Network (standard)
Performance – Benchmark Data Set • The data consist of keystroke-timing information from 51 subjects (typists), each typing apassword (.tie5Roanl) 400 times. • Test all Users: • GAR = 0.9084, FAR: 0.2341 • Test single User: • User: ‘s002’, GAR: 0.9025, FAR: 0.0372 • User: ‘s017’, GAR: 0.9275, FAR: 0.0260 • User: ‘s053’, GAR: 0.9550, FAR: 0.1782
Nearest Neighbor • Training Phase • Mean vectors of all user’s entries are constructed • Test Phase • Euclidean Distance between test entry and the constructed mean vectors are calculated • The one with the minimum value is selected as the current user
Experimental Results The results showed that implementation of Nearest Neighbor is not very effective So, just use of this methodology is not reliable. Combination of both techniques are used to increase the reliability.
Performance of Our Application • After testing our system • Password authentication: • GAR : Very high • FAR = Very low • To calculate exact values, we need complex password and large data set. • Password + constant text • Increases reliability
Conclusions Keystroke biometrics user authentication system is based on a password and keystroke biometric features The system offers a higher level of security and convenience for computers For our project we have selected Neural Networks (standard), Manhattan (scaled), and Nearest Neighbor (Mahalanobis)algorithms and “latency between consecutive keystrokes” and/or “duration of the keystroke, hold-time”techniques.
Conclusions (cont’d) • To train system Manhattan (scaled) and Nearest Neighboralgorithms are used successfully, but neural networks (standard) can not. • It is because that training process takes too long, and returning value is not suitable to test system.