1 / 7

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection. Ned Bakelman Advisor: Dr. Charles Tappert. Research Problem Statement. Using the keystroke biometric, how quickly and how accurately can we detect an intruder’s unauthorized use of another person’s computer?.

kamea
Télécharger la présentation

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Research Experiment Design Sprint:Keystroke Biometric Intrusion Detection Ned Bakelman Advisor: Dr.Charles Tappert

  2. Research Problem Statement • Using the keystroke biometric, how quickly and how accurately can we detect an intruder’s unauthorized use of another person’s computer?

  3. Background • DARPA is funding work to monitor military and government computers to detect intrusions • Pace University has developed a sophisticated keystroke biometrics system for text input • 300 keystrokes good accuracy- time response tradeoff • The Pace Keystroke Biometric System (PKBS) was updated to handle completely free (application independent) keystroke samples

  4. Methodology • Monitor each computer and continuously authenticate the user through via keystroke input • Assume one authorized user per machine for simplicity • During this continuing authentication process we want to detect an intruder as someone other than the authorized user

  5. Intruder Scenario 1 • User Bob leaves his office for lunch with his computer running and unlocked • Intruder Trudy sits down at Bob’s desk and uses the computer while Bob is at lunch • Trudy is not being malicious, but just taking advantage of an available computer – using it to type documents, surf the web, check her Facebook account, etc. • However there is sensitive information that Trudy could come across, so detecting that an “innocent” intruder is working on Bob’s computer is important

  6. Intruder Scenario 2 • Bob goes on his lunch break and leaves his computer accessible (on and unlocked, or password available) • Intruder Trudy starts using Bob’s computer to do various malicious activities: • Send emails impersonating Bob • Logon to Expense Tracking-Reimbursement to enter fake claims • Logon on to CRM (Customer Relationship Management) system to obtain contact information on customers • Modify financial statement spreadsheets on Bob’s hard drive • This is a more serious intrusion than Scenario 1

  7. Research Experiment Design Sprint • Design experiments to investigate the problem statement re the two scenarios • Ideas • Keyboard-entered keystrokes are a time series • Simulate the time series keystroke data of the authentic user with inserted intruder data • Use the data to run experiments with PKBS to obtain performance results

More Related