Behavioral biometrics
Download
1 / 11

Behavioral Biometrics - PowerPoint PPT Presentation


  • 152 Views
  • Updated On :

Behavioral Biometrics. Behaviometrics. Keystroke Dynamics Speaker Recognition. Behavioral Biometrics. Authentication/Verification vs. Identification. One Much Easier and Faster Offers multilayer (two factor) security.  Recognizes tone, rhythm cadence Text (in)dependence Simple Inputs

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Behavioral Biometrics' - melvyn


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Behavioral biometrics l.jpg

Behavioral Biometrics

Behaviometrics


Behavioral biometrics2 l.jpg

Keystroke Dynamics

Speaker Recognition

Behavioral Biometrics


Authentication verification vs identification l.jpg
Authentication/Verification vs. Identification

One Much Easier and Faster

Offers multilayer (two factor) security


Speaker recognition l.jpg

 Recognizes tone, rhythm cadence

Text (in)dependence

Simple Inputs

Resistant to Coercion  

Speaker Recognition


Problems issues l.jpg
Problems/Issues

Ambient Noise

Voice Recordings

Enrollment Time

Temporary Changes

Change Over Time


Keystroke dynamics l.jpg
Keystroke Dynamics

History

Typing verification

Seamless for user

Can lock out or warn in mid-session


Problems issues7 l.jpg
Problems/ Issues

Enrollment

Variable environment

Variable moods/ abilities

    Could be good

Hackers - timing information can greatly narrow the time to hack passwords  

Keyloggers

Once disclosed, no recovery


Commercial products l.jpg
Commercial Products

  • AdmitOneSecurity - formerly BioPassword (http://www.admitonesecurity.com)

  • iMagic Software (http://www.imagicsoftware.com)

  • ID Control (http://www.idcontrol.net)

  • Deepnet Security (http://www.deepnetsecurity.com)

  • Authenware Corp. (http://www.authenware.com)

  • bioChec™ (http://www.bioChec.com)

  • DiBiSoft (http://www.dibisoft.com)

  • Probayes (http://www.probayes.com)

  • Delfigo Security (http://www.delfigosecurity.com) 


Psylock l.jpg

Finalist in the  Global Security Challenge award 2007  

Third in the German IT-Security Award 2008. 

Psylock



References l.jpg
References...

  • Security and Usability. Chapter 10 Biometric Authentication (L. Coventry)

  • Security and Usability. Chapter 11 Identifying Users from Their Typing Patterns (A. Peacock, X. Ke, and M. Wilkerson)

  • Killourhy, Kevin S. and Maxion, Roy A. Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In International Conference on Dependable Systems & Networks (DSN-09), pp. 125-134, Estoril, Lisbon, Portugal, 29 June to 02 July 2009. IEEE Computer Society Press, Los Alamitos, California, 2009.

  • Killourhy, Kevin S. and Maxion, Roy A. The Effect of Clock Resolution on Keystroke Dynamics. In 11th International Symposium on Recent Advances in Intrusion Detection (RAID-08), 15-17 September 2008, Cambridge, Massachusetts, R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in Computer Science (LNCS), Vol. 5230, pp. 331-350, Springer-Verlag, Berlin, Heidelberg.

  • http://en.wikipedia.org/wiki/Keystroke_dynamics 

  • http://en.wikipedia.org/wiki/Speaker_recognition


ad