Behavioral Biometrics - PowerPoint PPT Presentation

About This Presentation
Title:

Behavioral Biometrics

Description:

Behaviometrics. Behavioral Biometrics. Keystroke Dynamics. Speaker Recognition ... and Maxion, Roy A. Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. ... – PowerPoint PPT presentation

Number of Views:1129
Avg rating:3.0/5.0
Slides: 12
Provided by: Goog
Learn more at: http://cups.cs.cmu.edu
Category:

less

Transcript and Presenter's Notes

Title: Behavioral Biometrics


1
Behavioral Biometrics
  • Behaviometrics

2
Behavioral Biometrics
  •  
  • Keystroke Dynamics
  • Speaker Recognition
  •  

3
Authentication/Verification vs. Identification
  •  
  •  
  • One Much Easier and Faster
  • Offers multilayer (two factor) security

4
Speaker Recognition
  •  
  •  Recognizes tone, rhythm cadence
  •  
  • Text (in)dependence
  •  
  • Simple Inputs
  • Resistant to Coercion  

5
Problems/Issues
  • Ambient Noise
  • Voice Recordings
  • Enrollment Time
  •  
  • Temporary Changes
  •  
  • Change Over Time

6
Keystroke Dynamics
  • History
  •  
  • Typing verification
  •  
  • Seamless for user
  • Can lock out or warn in mid-session

7
Problems/ Issues
  • Enrollment
  • Variable environment
  • Variable moods/ abilities
  •     Could be good
  • Hackers - timing information can greatly narrow
    the time to hack passwords  
  • Keyloggers
  •  
  • Once disclosed, no recovery

8
Commercial Products
  • AdmitOneSecurity - formerly BioPassword
    (http//www.admitonesecurity.com)
  • iMagic Software (http//www.imagicsoftware.com)
  • ID Control (http//www.idcontrol.net)
  • Deepnet Security (http//www.deepnetsecurity.com)
  • Authenware Corp. (http//www.authenware.com)
  • bioChec (http//www.bioChec.com)
  • DiBiSoft (http//www.dibisoft.com)
  • Probayes (http//www.probayes.com)
  • Delfigo Security (http//www.delfigosecurity.com) 

9
Psylock
  • Finalist in the  Global Security Challenge award
    2007  
  •  
  •  
  • Third in the German IT-Security Award 2008. 
  •  

10
http//www.psylock.com/index.php/lang-en/demo
11
References...
  • Security and Usability. Chapter 10 Biometric
    Authentication (L. Coventry)
  • Security and Usability. Chapter 11 Identifying
    Users from Their Typing Patterns (A. Peacock, X.
    Ke, and M. Wilkerson)
  • Killourhy, Kevin S. and Maxion, Roy A. Comparing
    Anomaly-Detection Algorithms for Keystroke
    Dynamics. In International Conference on
    Dependable Systems Networks (DSN-09), pp.
    125-134, Estoril, Lisbon, Portugal, 29 June to 02
    July 2009. IEEE Computer Society Press, Los
    Alamitos, California, 2009.
  • Killourhy, Kevin S. and Maxion, Roy A. The Effect
    of Clock Resolution on Keystroke Dynamics. In
    11th International Symposium on Recent Advances
    in Intrusion Detection (RAID-08), 15-17 September
    2008, Cambridge, Massachusetts, R. Lippmann, E.
    Kirda and A. Trachtenberg (Eds.), Lecture Notes
    in Computer Science (LNCS), Vol. 5230, pp.
    331-350, Springer-Verlag, Berlin, Heidelberg.
  • http//en.wikipedia.org/wiki/Keystroke_dynamics 
  • http//en.wikipedia.org/wiki/Speaker_recognition
Write a Comment
User Comments (0)
About PowerShow.com