Project Report: Data Analysis System For Behavioural Biometric Authentication (Keystroke Dynamics)
Project Report: Data Analysis System For Behavioural Biometric Authentication (Keystroke Dynamics)
Project Report: Data Analysis System For Behavioural Biometric Authentication (Keystroke Dynamics)
Figure 1#: S(ows t(e gra-( w(ic( re-resents a&& t(e attributes
0'is image %igure (1/* s'ows t'ree ot'er users w'ic' 'a#e tried to $og in wit' t'e same
password+ But t'e grap' s'ows us t'e #ariation in )eystroke Dynamics wit' t'e o$d users
w'o 'a#e &een trained to type 'is password+
9
Figure 1$: 2erification 3rocess S(ows )istance rea0ing
<igure (11* it s'ows 'ow accurate a sing$e user password can &e+ 0'e distance s'own
seems to &e simi$ar e#ery time t'e user 'as typed in+
-
Figure 1%: S(ows t(e vector recor0e0 an0 ot(er 0ata besi0e
t(e'.
/
8.1.7 +ow these data can be usefu!.
Figure 20
Source: Reference (web: 0$)
1
6.1.6 :E*9;N &)4 ,0E 6E<*,4)6E :3,3=3*E *)&,234E
3
4
Phase two % mp!ementation of a software for $eystro$e dynamic authentication
So%tware wou$d run as a c$ient ser#er approac'+ 5'en t'e c$ient try to $og in t'e ser#er
wou$d gi#e out t'e password %or aut'enticating+ 0'e main a&i$ity o% t'is app$ication is to
aut'enticate using t'e tec'no$ogy keystroke dynamics+
Bui$d 6 it is &ui$d in ja#a
2i&raries and ot'er needed 6 $atest jcommon and j%reec'artDjdk new
,dditiona$ reCuirement 6 Data&ase to &e insta$$ed+
Ser#er notes attac'ed $ast page+
90
,onclusion
.n conc$usionD t'e researc' in t'e ,$gorit'm shows us that Nearest Neig'&or
!Ma'a$ano&is" is one o% t'e &est ,$gorit'ms %or &e'a#ioura$ &iometric aut'entication
o% $eystro$e dynamic system as it is topped out performed in equal-error rate and
zero-miss false-alarm rate w'ic' makes it one o% t'e &est+ By t'e demonstration o% t'e
so%tware s'ows 'ow t'e tec'no$ogy in t'e present day 'as &ecomeD it cou$d at $east
reac' to a certain eEtent+ 0'e work input and process created &y t'e users t'at
continues to proceed in a way t'at is not t'e most e%%icient concerning security+
,ssuming 'uman &e'a#iour as a %actD di%%erent ways are $ooked into to reac' %or t'e
&est o% practices in securityD $ike now comp$eE passwords is used %rom t'e users w'o
used norma$ and traditiona$ met'ods o% passwords+ 0'e &e'a#ioura$ &iometric wou$d
&e t'e &est in t'e day a'ead+
91
-otations
? @ A @um-er of templates in a data-ase!
? S
A
(6& A 1ro-a-ility distri-ution function as a function of the score(s& produced
-y the genuine attempt(s&!
? S
.
(6& A 1ro-a-ility distri-ution function as a function of the score(s& produced -y
the impostor attempt(s&!
? T A 6imilarity score threshold
? F3> A False match rate
? F@3> A False non match rate
? F'> A False acceptance rate
? F>> A False reBection rate
References
,raujoD 2C?D SucupiraD 28:D 2i=arragaD MAD 2ingD 22D K Ba&u;FtiD OB0D !200-" Fser
,ut'entication 0'roug'
92
0yping Biometrics <eatures+ .EEE 0ransactions on Signa$ @rocessing - !2" pp+ 3-1;3--+
BergandoD <D AunettiD DD K @icardiD CD !2002" Fser ,ut'entication t'roug' )eystroke
Dynamics+ ,CM
0ransactions on .n%ormation and System SecurityD - !9"D pp+ /1;41+
MonroseD <D K :u&inD , !1441" ,ut'entication ?ia )eystroke Dynamics+ .n: @roceedings
o% t'e 9t' ,CM
con%erence on Computer and communications security+ New Bork: ,CM @ress
>&aidatD M S !144-" , #eri%ication met'odo$ogy %or computer systems users+ @roceedings
o% t'e 144- ,CM
symposium on ,pp$ied computing+ pp+ 2-3 ; 2/2
D+Fmp'ress+ and A+5i$$iamsD!143-"H.dentity #eri%ication t'roug' key&oard
c'aracteristicsJ+ .nternat+ O+ManMac'+Stud+2D2/621+143-
>&aidatD M+S+D SadounD B+: ?eri%ication o% computer users using keystroke dynamics+
.EEE 0ransactions on SystemsD Man and Cy&ernetics 21 !1441" 2/162/4
Mi$$erD B+: ?ita$ signs o% identity+ .EEE Spectrum 1 !1449" 2260
Simon 2iu and Mark Si$#ermanD , @ractica$ Auide to Biometric Security 0ec'no$ogy+
.EEE .0 @ro%essiona$D ?o$ume D Num&er 1!2001"21;2
2awrence >GAormanD ,#aya 2a&s :esearc'D Basking :idgeD NO+ Securing BusinessGs
<ront Door; @asswordD 0oken and Biometric ,ut'entication+.EEE !200"22;9
:+ >+ DudaD @+ E+ 8artD and D+ A+ Stork+ @attern C$assi%ication+Oo'n 5i$ey K SonsD .nc+D
second editionD 2001+
9
S+ B$e'aD C+ S$i#inskyD and B+ 8ussien+ Computeraccess security systems using keystroke
dynamics+ .EEE 0ransactions on @attern ,na$ysis and Mac'ine .nte$$igenceD
12!12":121161222D 1440+
:+ Ooyce and A+ Aupta+ .dentity aut'entication &ased on keystroke $atencies+
Communications o% t'e ,CMD!2":1/3611/D 1440+
2+ C+ <+ ,raPujoD 2+ 8+ :+ SucupiraD M+ A+ 2i=ParragaD 2+ 2+2ingD and O+ B+ 0+ Ba&u;uti+
Fser aut'entication t'roug' typing &iometrics %eatures+ .n @roceedings o% t'e 1st
.nternationa$ Con%erence on Biometric ,ut'entication !.CB,"D#o$ume 011 o% 2ecture
Notes in Computer ScienceD pages /496100+ Springer;?er$agD Ber$inD 2009+
S+ C'oD C+ 8anD D+ 8+ 8anD and 8+ )im+ 5e&;&asedkeystroke dynamics identity
#eri%ication using neura$ network+Oourna$ o% >rgani=ationa$ Computing and E$ectronic
CommerceD 10!9":24-601D 2000+
S+ 8aiderD ,+ ,&&asD and ,+ )+ Qaidi+ , mu$ti;tec'niCue approac' %or user identi%ication
t'roug' keystroke dynamics+.EEE .nternationa$ Con%erence on SystemsD Man and
Cy&erneticsD pages 1/6191D 2000+
B+ 8wang and S+ C'o+ C'aracteristics o% auto;associati#e M2@ as a no#e$ty detector+ .n
@roceedings o% t'e .EEE .nternationa$ Ooint Con%erence on Neura$ NetworksD #o$ume -D
pages 03/6041D 1061/ Ou$yD 1444D5as'ingtonD DCD 1444+
E+ Bu and S+ C'o+ A,;S?M wrapper approac' %or %eature su&set se$ection in keystroke
dynamics identity #eri%ication+ .n @roceedings o% t'e .nternationa$ Ooint Con%erence on
Neura$ Networks !.OCNN"D pages 22-622-1+ .EEE @ressD 200+
@+ )angD S+ 8wangD and S+ C'o+ Continua$ retraining o% keystroke dynamics &ased
aut'enticator+ .n @roceedings o% t'e 2nd .nternationa$ Con%erence on Biometrics !.CBG01"D
pages 12061211+ Springer;?er$ag Ber$in 8eide$&ergD 2001+
99
O+ ,+ Swets and :+ M+ @ickett+ Evaluation of Diagnostic Systems !ethods from Signal
Detection "heory+ ,cademic @ressD New BorkD 1432
)e#in )i$$our'y+!2003":,.D U03 @roceedings o% t'e 11t' internationa$ symposium on
:ecent ,d#ances in .ntrusion Detection
)e#in )i$$our'y!2010"5'y Did My Detector Do 0'at7V@redicting )eystroke;Dynamics
Error :ates+:,.D
CENE2EC+ European Standard EN -01;1: ,$arm systems+ ,ccess contro$ systems %or
use in security app$ications+ @art 1: System reCuirementsD 2002+ Standard Num&er
EN -01;1:144//,1:2002D 0ec'nica$ Body C2C/0C14D European Committee %or
E$ectrotec'nica$ Standardi=ation !CENE2EC"+
#ebPa"es Accessed:
5e&+01: #$dentity %ard&D (,ccessed on 1-;09;2011 at 1+00pm* a#ai$a&$e on WF:2X
'ttp://we&arc'i#e+nationa$arc'i#es+go#+uk/20110104112-4/'ttp://ips+go#+uk/cps/rde/Ec
'g/ipsY$i#e/'s+Es$/-+'tm
5e&+02: #'ouse of common&D (,ccessed on 1-;09;2011 at 2+00pm* a#ai$a&$e on WF:2X
we&:'ttp://www+pu&$ications+par$iament+uk/pa/cm200-0//cm&i$$s/094/200/094+'tm
5e&+0: #"elegraph&D (,ccessed on 14;09;2011 at /+00pm* a#ai$a&$e on WF:2X
'ttp://www+engadget+com/200-/0-/0//morse;code;trumps;sms;in;'ead;to;'ead;
speed;teEting;com&at/
5e&+09: #9estern Carolina Uni4ersity&D (,ccessed on 20;09;2011 at 10+00pm* a#ai$a&$e on
WF:2X httpC55et!"cu!edu5aidc5.io9e-1ages5.iometricsD,eystro+e!html
9-
5e&+0-: #Biometric $dentification()uthentication "echniques&D (,ccessed on 21;09;2011
at -+00pm* a#ai$a&$e on WF:2X
'ttp://www+a$tisinc+com/resources/Biometric/tec'niCues+p'p
5e&+0/: #biometric solution&D (,ccessed on 22;09;2011 at 1/+00pm* a#ai$a&$e on
WF:2X 'ttp://www+&iometric;so$utions+com/indeE+p'p7storyMper%ormanceY&iometrics
5e&+01: #*eystroke Dynamics - Benchmark Data SetJD (,ccessed on 2/;0-;2011 at
4+00pm* a#ai$a&$e on WF:2X 'ttp://www+cs+cmu+edu/Zkeystroke/
5e&+03: #+ser authentication using keystroke
Dynamics for cellular phoneJD (,ccessed on 2/;0-;2011 at 4+00pm* a#ai$a&$e on WF:2X
'ttp://ieeeEp$ore+ieee+org/stamp/stamp+jsp7arnum&erM0-1193
9/