research experiment design sprint keystroke biometric intrusion detection n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection PowerPoint Presentation
Download Presentation
Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection

Loading in 2 Seconds...

play fullscreen
1 / 7

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection - PowerPoint PPT Presentation


  • 89 Views
  • Uploaded on

Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection. Ned Bakelman Advisor: Dr. Charles Tappert. Research Problem Statement. Using the keystroke biometric, how quickly and how accurately can we detect an intruder’s unauthorized use of another person’s computer?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Research Experiment Design Sprint: Keystroke Biometric Intrusion Detection' - kamea


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
research experiment design sprint keystroke biometric intrusion detection

Research Experiment Design Sprint:Keystroke Biometric Intrusion Detection

Ned Bakelman

Advisor: Dr.Charles Tappert

research problem statement
Research Problem Statement
  • Using the keystroke biometric, how quickly and how accurately can we detect an intruder’s unauthorized use of another person’s computer?
background
Background
  • DARPA is funding work to monitor military and government computers to detect intrusions
  • Pace University has developed a sophisticated keystroke biometrics system for text input
    • 300 keystrokes good accuracy- time response tradeoff
  • The Pace Keystroke Biometric System (PKBS) was updated to handle completely free (application independent) keystroke samples
methodology
Methodology
  • Monitor each computer and continuously authenticate the user through via keystroke input
    • Assume one authorized user per machine for simplicity
  • During this continuing authentication process we want to detect an intruder as someone other than the authorized user
intruder scenario 1
Intruder Scenario 1
  • User Bob leaves his office for lunch with his computer running and unlocked
  • Intruder Trudy sits down at Bob’s desk and uses the computer while Bob is at lunch
  • Trudy is not being malicious, but just taking advantage of an available computer – using it to type documents, surf the web, check her Facebook account, etc.
  • However there is sensitive information that Trudy could come across, so detecting that an “innocent” intruder is working on Bob’s computer is important
intruder scenario 2
Intruder Scenario 2
  • Bob goes on his lunch break and leaves his computer accessible (on and unlocked, or password available)
  • Intruder Trudy starts using Bob’s computer to do various malicious activities:
    • Send emails impersonating Bob
    • Logon to Expense Tracking-Reimbursement to enter fake claims
    • Logon on to CRM (Customer Relationship Management) system to obtain contact information on customers
    • Modify financial statement spreadsheets on Bob’s hard drive
  • This is a more serious intrusion than Scenario 1
research experiment design sprint
Research Experiment Design Sprint
  • Design experiments to investigate the problem statement re the two scenarios
  • Ideas
    • Keyboard-entered keystrokes are a time series
    • Simulate the time series keystroke data of the authentic user with inserted intruder data
    • Use the data to run experiments with PKBS to obtain performance results