1 / 11

Behavioral Biometrics

Behavioral Biometrics. Behaviometrics. Keystroke Dynamics Speaker Recognition. Behavioral Biometrics. Authentication/Verification vs. Identification. One Much Easier and Faster Offers multilayer (two factor) security.  Recognizes tone, rhythm cadence Text (in)dependence Simple Inputs

melvyn
Download Presentation

Behavioral Biometrics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Behavioral Biometrics Behaviometrics

  2. Keystroke Dynamics Speaker Recognition Behavioral Biometrics

  3. Authentication/Verification vs. Identification One Much Easier and Faster Offers multilayer (two factor) security

  4.  Recognizes tone, rhythm cadence Text (in)dependence Simple Inputs Resistant to Coercion   Speaker Recognition

  5. Problems/Issues Ambient Noise Voice Recordings Enrollment Time Temporary Changes Change Over Time

  6. Keystroke Dynamics History Typing verification Seamless for user Can lock out or warn in mid-session

  7. Problems/ Issues Enrollment Variable environment Variable moods/ abilities     Could be good Hackers - timing information can greatly narrow the time to hack passwords   Keyloggers Once disclosed, no recovery

  8. Commercial Products • AdmitOneSecurity - formerly BioPassword (http://www.admitonesecurity.com) • iMagic Software (http://www.imagicsoftware.com) • ID Control (http://www.idcontrol.net) • Deepnet Security (http://www.deepnetsecurity.com) • Authenware Corp. (http://www.authenware.com) • bioChec™ (http://www.bioChec.com) • DiBiSoft (http://www.dibisoft.com) • Probayes (http://www.probayes.com) • Delfigo Security (http://www.delfigosecurity.com) 

  9. Finalist in the  Global Security Challenge award 2007   Third in the German IT-Security Award 2008.  Psylock

  10. http://www.psylock.com/index.php/lang-en/demo

  11. References... • Security and Usability. Chapter 10 Biometric Authentication (L. Coventry) • Security and Usability. Chapter 11 Identifying Users from Their Typing Patterns (A. Peacock, X. Ke, and M. Wilkerson) • Killourhy, Kevin S. and Maxion, Roy A. Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In International Conference on Dependable Systems & Networks (DSN-09), pp. 125-134, Estoril, Lisbon, Portugal, 29 June to 02 July 2009. IEEE Computer Society Press, Los Alamitos, California, 2009. • Killourhy, Kevin S. and Maxion, Roy A. The Effect of Clock Resolution on Keystroke Dynamics. In 11th International Symposium on Recent Advances in Intrusion Detection (RAID-08), 15-17 September 2008, Cambridge, Massachusetts, R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in Computer Science (LNCS), Vol. 5230, pp. 331-350, Springer-Verlag, Berlin, Heidelberg. • http://en.wikipedia.org/wiki/Keystroke_dynamics  • http://en.wikipedia.org/wiki/Speaker_recognition

More Related