Upload
evin-joy
View
214
Download
0
Embed Size (px)
Citation preview
8/12/2019 c Se Project
1/46
Data analysis system for behaviouralbiometric authentication [Keystroke
Dynamics]
Project Report
8/12/2019 c Se Project
2/46
Department of Electronic and Computer Engineering
Faculty of Technology
June 2014
2
Name:
Student number:
Course Stream: BEng 2010/11 projects
Course: Computer Network Management
and Design year !CNB"
Super#isor:
8/12/2019 c Se Project
3/46
Contents
Data ana$ysis system %or &e'a#ioura$ &iometric aut'entication ()eystroke Dynamics*+ ++ ++1
Name: +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++2
Student num&er: +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++2
,&stract+++++++++++++-
1+ .ntroduction++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1+1 Biometric and aut'entication systems++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1+1+1 wo types o% &iometrics c'aracteristics systems:+++++++++++++++++++++++++++++++++++++++++++++++++
1+1+2 +Biometric ,ut'entication+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1+1+ +imitations o% .denti%ication and ,ut'entication+++++++++++++++++++++++++++++++++++++++++++++++++3
2+ Background 'eory (Be'a#ioura$ &iometric keystroke dynamics*++++++++++++++++++++++++++++++++++4
+ ec'no$ogy +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++10
+1 +5'at is keystroke dynamic 6 (&e'a#ioura$ &iometric*7+++++++++++++++++++++++++++++++++++++++++++10
+2 +5'y keystroke dynamic &e'a#ioura$ Biometric+++++++++++++++++++++++++++++++++++++++++++++++++++++++11
+2 +8ow )eystroke Dynamic works+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++1
+2+1 +)eystroke Metrics+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++1
9+ esearc' and ,na$ysis on ,$gorit'm %or )eystroke Dynamics+++++++++++++++++++++++++++++++++++++1
9+1 )ey 'ings w'ic' decides 'ow good t'e aut'entication system is or t'e ,$gorit'm
is+ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++1
9+2+ ,$gorit'ms ,#ai$a&$e %or keystroke dynamics ++++++++++++++++++++++++++++++++++++++++++++++++++++++++13
9+2+1+ Euc$idean++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++13
9+2+2+ Euc$idean !normed"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++13
9+2++ Man'attan+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++13
9+2+9+ Man'attan !%i$tered"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++14
9+2+-+ Man'attan !sca$ed" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++14
9+2++ Ma'a$ano&is++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++14
9+2++ Ma'a$ano&is !normed"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++14
9+2+3+ Nearest;neig'&or !Ma'a$ano&is"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++14
9+2+4+ Neura$;network !standard"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++20
9+2+10+ Neura$;network !auto;assoc"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++20
9+2+11+
8/12/2019 c Se Project
4/46
9+2+12+ >ut$ier;counting !=;score"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++20
9+2+1+ S?M !one;c$ass"+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++20
9+2+19+ k;means+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++21
9+ ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++219++ Ca$cu$ating detector per%ormance+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++22
9++1+ 'e resu$t o% t'e comparison s'own &e$ow in %igure (3*+++++++++++++++++++++++++++++++++++2
9++2+ >t'er researc'ers wit' t'e a$gorit'm comparison++++++++++++++++++++++++++++++++++++++++++++++2-
-+ )ey En#ironmenta$ %actors a%%ecting )eystroke Dynamics+ +++++++++++++++++++++++++++++++++++++++++2
-+1 C$ock eso$ution is one o% t'e major 5 8E S>>)S ,M@ES.>N+++++++++++++++++++++++++++++1
+1+ Capa&i$ity o% t'e so%tware++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++1
+1+9 @ictures &e$ow s'ows a %eatures o% t'e so%tware++++++++++++++++++++++++++++++++++++++++++++++++++++2
+1+- 8ow t'ese data can &e use%u$++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+1+ DES.AN 8E )ES>)E D,,B,SE S>
8/12/2019 c Se Project
5/46
Abstract
'e more ser#ices w'ic' are coming in w'en t'ere is 'ig' rise o% t'e internet and t'e pus'
%or u&iuitous computing 'a#e turned t'e wor$d o% tec'no$ogy wit' di%%erent sing$e
met'od so$utions o% aut'entication+ Some are %orcing peop$e to remem&er di%%icu$t codes
w'ic' 'as &een increasing$y di%%icu$t among t'e users+ .t 'as &een etensi$e used
e#eryw'ere w'ere t'ere is aut'entication it cou$d &e in emai$s &$ogs or %or .S@ ser#ice
pro#iders or &y &anks ,M mac'ines and many+ 'e eisting system o% tetua$ password
or any o% t'e token &ased system do not o%%er t'e needed security standard %or its users
w'o aut'enticate &ut t'e &io$ogica$ %eature o% t'e user in &e'a#ioura$ &iometric w'en
typing tet are #ery promising w'en compared to t'e actua$ tetua$ passwords+
'e main o&jecti#e o% t'is project is to comp$ete compre'ensi#e researc' into a#ai$a&$e
a$gorit'm %or &e'a#ioura$ &iometric aut'entication ()eystroke Dynamics* t'en comparing
t'em in suc' a way t'at s'owing 'ow accurate t'ey are and imp$ementing one o% t'e
a$gorit'm to s'ow 'ow t'ey work+
-
8/12/2019 c Se Project
6/46
1. Introuction
1.1 Biometric and authentication systems
Fser ,ut'entication 'as &een a #ery &ig issue in computer system as t'ere 'a#e &een
many ser#ices coming in wit' aut'entication o% users+ Biometric was one o% t'e major
so$utions to meet t'e mu$tip$e %actor aut'entication o&jecti#es %or major companies or
&usiness w'o gi#e out ser#ices+ ,ny'ow cost was a major %actor pre#enting t'e
organisations %rom getting a &iometric so$ution+ 'at donGt comp$ete$y mean ot'er %actors
o% so$utions are any $ess cost pro'i&iti#e+ 'e capita$ ependiture and on ;going
maintenance cost o% token;&ased system are o%ten 'ig'er t'an t'ose %or &iometrics+ 'is
#enture o#er 'ere mig't meet up wit' t'is &usiness c'a$$enges+ So%tware wit' no
&iometric de#ice attac'ed to it just a computer system w'ic' 'as a standard key&oard is
w'at a$$ it reuires t'is mean met'od o% aut'entication is o% &e'a#ioura$ &iometric
aut'entication using t'e )eystroke Dynamics ec'no$ogy+
H'ree di%%erent user aut'entication types can &e c$assi%ied under t'e security %ie$d used
!Simon iu and Mark Si$#erman 2001"+
I Somet'ing you know ; a password @.N or a piece o% persona$ in%ormation !suc' as your
mot'erGs maiden name"+
I Somet'ing you 'a#e ; a card key smart card or a token !$ike a Secur.D card"+
I Somet'ing you are ; a &iometric+J !Simon iu and Mark Si$#erman+ 2001"
'e measurement o% t'e indi#idua$s Biometric cou$d &e in any %orms it cou$d &e @'ysica$
or &e'a#ioura$ c'aracteristics use to recognise or aut'enticate t'e user wit' t'eir uniue
identities+ .t does a titanic jo& wit'out any escape %or errors &y $inking t'e aut'enticator to
its owner w'ic' a password or a token canGt do as t'ey can &e taken away or sto$en were
as &iometric is our own+
8/12/2019 c Se Project
7/46
1.1.1 Two types of biometrics characteristics systems:
IPhysiological characteristic of biometric: t'is inc$udes more o% t'e tec'niues w'ic' are
sta&$e p'ysica$ c'aracters suc' as %ingerprints iris or retina+
IBehavioural characteristic of biometric: are t'ose tec'niues w'ic' s'ow a indi#idua$s
c'aracter decision it cou$d &e a keystroke pattern t'e way a person wa$ks wou$d &e
uniue to a sing$e person !Bergando et a$ 2002"+
Due to t'e $itt$ie c'anges in t'e c'aracter or decision o% most &e'a#ioura$ c'aracteristics
it 'as to &e designed %or &eing more dynamic and 'as to accept $itt$e rate o% #aria&i$ity+
ooking at di%%erent aspect o% &e'a#ioura$ &iometrics it is $ess intrusi#e systems were
contri&ution to more accepta&i$ity %or t'e users+
1.1.2 .Biometric Authentication
Biometric aut'entications natura$$y terminate t'e gap &etween t'e risks o% anonymity in a
two;%actor security scenario &y using an attri&ute o% t'e person to aut'enticate a token+
,ut'entication systems %o$$ow &y t'e steps s'own &e$ow+
I ,cuisition:
.mage o% t'e users attri&ute is taken+
I oca$i=ation:
'e attri&ute is stored minutiae etracted and a matc'ing temp$ate created+
I Matc'ing:
'e #a$ue o% t'e token is compared wit' t'e temp$ate pre#ious$y stored %or t'is user+ .% t'e
temp$ate &ecomes matc' t'e reuestor is aut'enticated !e%erence: we& +0-"+ (
8/12/2019 c Se Project
8/46
Figure 1.1: Biometric Authentication Process
Source: Reference (web: 05)
1.1.3 .Limitations of dentification and Authentication
Due to t'e c$assi%ication o% &iometric identi%ication and aut'entication matc'ing
tec'niues as pro&a&i$istic t'ere is a margin o% error in o&tained resu$ts+ 8owe#er %a$se
rejections are considered more accepta&$e t'an %a$se acceptance+
,ut'entication sc'emes are more re$ia&$e and e%%icient t'an pure identi%ication sc'emes+
'is is main$y &ecause t'e aut'entication temp$ate on$y 'as to &e matc'ed on to
aut'enticate w'ereas it may &e matc'ed against 'undreds or t'ousands o% records to
identi%y a person+
3
8/12/2019 c Se Project
9/46
!. "ack#roun $heory ["ehavioural biometric keystroke ynamics]
H,s in t'e ear$y o% t'e &eginning o% t'e 20t' century psyc'o$ogists 'a#e demonstrated
t'at human actions are predictable in performance of repetitive and routine task+J
(Umphress and !"illiams!1#$%&
)eystroke dynamics is a &iometric w'ic' is &ased on a disco#ery t'at eac' and e#ery
'uman type in uniue$y c'aracteristic manners+ .n ear$ier 14 t'century >&ser#ation o%
te$egrap' operators re#ea$ed persona$$y distincti#e patterns w'en keying messages o#er
te$egrap' $ines and t'e way t'ey keyed in or t'e dynamics o% it was t'e on$y way to
recogni=e eac' ot'er !Mi$$er 1449"+
Figure 2: Te!e"raph
Source: Reference (web: 03)
'e one w'ic' come mental conception to &iometric identi%ication wou$d &e t'e
signature recognition+ ,s &ot' ()D and signature recognition* identi%y t'e su&jects &y t'e
writing dynamics w'ic' is conceptua$$y same %or a $arge num&er o% users among peop$e+
)eystroke dynamics 'as &een known in di%%erent name suc' as: Hkey&oard dynamics
keystroke ana$ysis typing &iometrics and typing r'yt'ms+J
!>&aidat M+S K Sadoun+ 144"
4
8/12/2019 c Se Project
10/46
%. $echnolo#y
3.1 .#hat is $eystro$e dynamic % &beha'ioura! biometric()
)eystroke Dynamics it is a process were t'e data is captured t'e way or 'ow t'e person
types at t'e key&oard and t'ose data is ana$ysed to identi%y t'em !,raujo 200-"+'e
measurements or t'e #a$ues in t'e data wou$d inc$ude t'e timestamp %or pressing and
re$easing o% keys 'e code %or t'e particu$ar key pressed and t'e pressure !Monrose Ku&in 2000"+
)eystroke Dynamics is tec'niue in &iometric +'e &iometric tec'niues can &e di#ided
into two categories i+e+ @'ysio$ogica$ &iometric $ike %ingerprint iris %ace recognition+ ,nd
t'e Be'a#ioura$ &iometrics $ike signatures #oice or keystroke dynamics !Bergando et a$
2002"+E#en t'e Fnited )ingdom @assport ser#ice 'ad $ooked into and esta&$is'ed %acia$
iris and %ingerprint &iometric tec'niues w'ic' $ater was to &e added to t'e &iometric datain t'e .D Cards t'is was t'e main de&ate in ear$ier time o% 200!e%erence: we& +02" &ut
now it 'as &een cance$$ed !e%erence: we& +01"+ 'ese card and ot'er met'ods t'ey try to
add was a$$ p'ysio$ogica$ &iometrics tec'niues w'ic' is tend to &e a sta&$e data it 'as or
it wonGt c'ange %or a $ong period o% time some donGt e#en c'ange !Bergando et a$
2002"+,ny 'ow $ooking at it t'e ad#antage %or t'e &e'a#ioura$ &iometric wou$d &e #ery
$ess epensi#e compared to t'e ot'ers to imp$ement and it is $ess intrusi#e %or users
!Monrose K u&in 2000"
10
8/12/2019 c Se Project
11/46
3.2 .#hy $eystro$e dynamic beha'ioura! Biometric
Now a dayGs users access t'eir system account using t'e username and t'e passwords
gi#ing at t'e $ogin screen+ 'is wou$d &e one o% t'e pre%era&$e met'ods o% &ecause it is
$ow cost and it 'as &een known &y e#eryone 'ow to use !,raujo 200-"+'en to it 'as its
own $imits : i% password is a memora&$e p'rase or a word it may &e guessa&$e &y
ot'ers &ut i% it is a string o% meaning$ess c'aracters t'e user mig't %orget it!peacock et a$
2009"'e &etter t'e word is not remem&er a&$e means t'e &etter t'e password +.n t'e
%ormer case t'ere cou$d &e a serious &reac' o% security+ .t wi$$ &e tota$ waste &y a$$ocating
a new password+ 'is 'as &ecome a major pro&$em as t'ere 'as &een many peop$e getting
registered and getting used to internet as now more ser#ices are a#ai$a&$e t'an ear$ier
days+ Many users tent to use t'eir sing$e password %or t'e mu$tip$e accounts t'ey 'a#e in
di%%erent ser#ices !@eacock 2009" w'ic' wi$$ %urt'er resu$t in greater identity t'e%t+
Monrose and u&in !2000" argue t'at t'e natura$ met'od %or user identi%ication wou$d &e
keystroke dynamics+ ,s per 'ow t'e password is t'e keystroke &iometrics canGt &e sto$en
or $ost %rom any person as itGs an indi#idua$Gs own+
5'en comparing wit' t'e ot'er &iometric tec'niue $ike %ingerprint recognition and iris
%ace recognition t'e keystroke &iometric donGt need any ot'er additiona$ euipment;
ecept a$$ w'at it reuires is a standard key&oard and a computer so it is c'eaper and
practica$ and is a$so easy to imp$ement+ 5'en $ooking in contrast wit' t'e ot'er tec'niue
$ike iris scanning w'ic' need more cooperation o% t'e user t'is one wou$d &e non;
intrusi#e %or users+
11
8/12/2019 c Se Project
12/46
Figure 3: *ost of ownership and maintenance chart showin" how re!iab!e it is in a!! ways
Source: Reference (web: 06)
12
8/12/2019 c Se Project
13/46
3.2 .+ow ,eystro$e -ynamic wor$s
)eystroke dynamics measures t'e series o% key down and key up e#ent timings w'i$e t'e
user types a string i+e+ i% a userGs password is LpasswordG t'en t'e key down and key up
e#ents are captured %or e#ery a$p'a&et+
3.2.1 .,eystro$e etrics
>ne oious measurement to ana$yse and to get data %or ca$cu$ation is &y measuring t'e
$engt' o% time t'at a person 'o$ds down a sing$e key+ 'is 'as &een named as t'e dwe!!
time+ !5estern Caro$ina Fni#ersity 200-"+
HDwe$$ime)1 keyFp)1 ; keyDown)1J
>&aidat !144-" dictator pro#ed t'at t'e time taken &etween $i%ting t'e %inger o%% one key
and pressing t'e net 6 f!i"ht time6 gi#es &etter per%ormance t'an dwe$$ time a$one+
H
8/12/2019 c Se Project
14/46
Figure 3: ,eystro$e -we!! Time and /!i"ht Time
Source: Reference (web: 04)
Figure 4: ,eystro$e -we!! Time and /!i"ht Time
Source: Reference (web: 04)
19
8/12/2019 c Se Project
15/46
>nce w'en t'e processing o% co$$ecting t'e data is %inis'ed t'e data is ana$ysed and
processed &y a particu$ar a$gorit'm w'ic' determines a primary pattern %or $ater
comparison+
,$gorit'ms 'a#e greater importance in t'is so%tware t'e &etter t'e a$gorit'm t'e more
good t'e so%tware determines t'e data %ast and in a re$ia&$e way+ 'en comes t'e $ast
process $ike any o% t'e &iometric tec'no$ogies app$ied to an aut'entication jo& were major
%unctions is to enro$ and #eri%y credentia$s+
1-
8/12/2019 c Se Project
16/46
&. Research an Analysis on Al#orithm for Keystroke Dynamics.
0.1 ,ey Thin"s which decides how "ood the authentication system is or the
A!"orithm is.
'e aut'entication system to &e per%ect or not is decided &y t'e !
8/12/2019 c Se Project
17/46
Figure 5: Crossover error rate
Source: Reference (web: 06)
8/12/2019 c Se Project
18/46
Figure 6: FR! FRR! C"R
Source: Reference (web: 06)
9+2+ ,$gorit'ms ,#ai$a&$e %or keystroke dynamics
4.2.1. Euclidean
'is one is Hc$assic anoma$y;detection a$gorit'm mode$J !Duda 8art and Stork
2001"@oint inp;dimensiona$ space is a password p is t'e one w'ic' is in timing #ectors
+ Suared Euc$idean distance &etween two o% t'em #ector and t'e mean is ca$cu$ated as
t'e anoma$y score+
4.2.2. Euclidean (normed)
,s &y B$e'a !B$e'aS$i#insky and 8ussien 1440" w'o named it as t'e Hnorma$i=ed
minimum distance c$assi%ier+J suared Euc$idean distance &etween t'e test #ector and t'e
mean #ector is ca$cu$ated &ut t'e Hanoma$y score is ca$cu$ated &y Hnorma$i=ingJ t'is
distance di#iding it &y t'e product o% t'e norms o% t'e two #ectors+J
4.2.3. Manhattan
'is c$assic anoma$y;detection a$gorit'm !+ >+ Duda @+ E+ 8art and D+ A+ Stork 2001"
imitates Euc$idean detector were t'e distance measure is t'e Man'attan distance instead
o% Euc$idean detector+ ,noma$y score is ca$cu$ated as t'e Man'attan distance &etween t'e
mean in t'e test purpose+
13
8/12/2019 c Se Project
19/46
4.2.4. Manhattan (filtered)
.t is simi$ar to t'e Man'attan detector ecept out$iers in t'e training data are %i$tered+
!Ooyce and A+ Aupta 1440"+ 'e anoma$y score is ca$cu$ated as t'e Man'attan distance
&etween t'is ro&ust mean #ector and t'e test #ector+
4.2.5. Manhattan (scaled)
'e ca$cu$ation is same as Man'attan distance &ut wit' a sma$$ c'ange+ !,raPujo
Sucupirai=Parraga ing and a&u;uti 2009"+ 'e anoma$y score is ca$cu$ated as
,
%eatures o% t'e test and mean #ectors respecti#e$yand ai is t'e a#erage a&so$ute de#iation
%rom t'e training p'ase+ 'e gi#en out score s'ows Man'attan;distance ca$cu$ation
ecept eac' dimension is sca$ed &y ai+
4.2.6. Mahalanobis
'e c$assic anoma$y;detection a$gorit'm !+ >+ Duda @+ E+ 8art and D+ A+ Stork 2001"
w'ic' wou$d &e simi$ar to Euc$idean and Man'attan detectors t'en to t'e distance
measure 'as &een more comp$e+ 'e anoma$y score is ca$cu$ated as t'e Ma'a$ano&is
distance &etween t'e mean #ector and t'e test #ector+
4.2.7. Mahalanobis (normed)
!B$e'aS$i#insky and 8ussien 1440" w'o ca$$ed it t'e Hnorma$i=ed Bayes c$assi%ier+J t'e
Ma'a$ano&is distance &etween t'e mean #ector and test #ector is ca$cu$ated+ 'e anoma$y
score is ca$cu$ated &y Hnorma$i=ingJt'e Ma'a$ano&is distance using t'e same di#isor as
t'e Euc$idean !normed" detector+
4.2.8. Nearestnei!hbor (Mahalanobis)
!C'o8an 8an and )im 2000"+ t'e detector ca$cu$ates t'e Ma'a$ano&is distance
&etween eac' o% t'e training #ectors and t'e test #ector+ 'e anoma$y score is &y t'e
distance w'ic' takes %rom t'e test #ector to nearest training #ector+ !C'o8an 8an and
)im 2000"+
14
8/12/2019 c Se Project
20/46
4.2.". Neuralnet#or$ (standard)
!8aider ,&&as and Qaidi 2000"+ .t incorporates a %eed;%orward neura$;network trained
wit' t'e &ack;propagation a$gorit'm + !Duda 8art and Stork 2001" H, network is &ui$t
wit' p input nodes one output node and 2p/'idden nodes+J !8aider ,&&as and Qaidi2000"+
4.2.1%. Neuralnet#or$ (autoassoc)
!C'o8an 8an and )im 2000"+ 5'o ca$$ed it an Hauto;associati#e mu$ti$ayer
perceptron+J 'is is made into a &ack;propagation a$gorit'm rat'er t'an a typica$ neura$
network ;structure o% t'e network stricter was designed %or anoma$y detector !8wang andS+ C'o 1444"+ 'e Euc$idean distance w'ic' $ays &etween test #ector and t'e output
#ector is ca$cu$ated to get t'e anoma$y scoreJ !C'o8an 8an and )im 2000"+
4.2.11. &u''lo!ic
!8aider ,+ ,&&as and ,+ )+ Qaidi 2000"+ .t incorporates a %u==y;$ogic in%erence
procedure+ 'e key idea is t'at ranges o% typing times are assigned to %u==y sets+'e sets
are ca$$ed %u==y &ecause e$ements can partia$$y &e$ong to a set Eac' timing %eature is
c'ecked to see i% it &e$ongs to t'e same set as t'e training data+ H'e anoma$y score is
ca$cu$ated as t'e a#erage $ack o% mem&ers'ip across a$$ test #ector timing %eatures+J
!8aider ,+ ,&&as and ,+ )+ Qaidi 2000"+
4.2.12. utliercountin! ('score)
!8aider ,+ ,&&as and ,+ )+ Qaidi 2000" 'e aut'er ca$$es it &y Hstatistica$ tec'niue
t'e detector computes t'e a&so$ute =;score o% eac' %eature o% t'e test #ector+ 'e =;score is
app$ied to Ri + yiR /si &y t'e i;t' %eature w'ere i and yi are t'e i;t' %eatures o% t'e test
and mean #ectors respecti#e$y and si is t'e standard de#iation %rom t'e training p'ase+
!8aider ,+ ,&&as and ,+ )+ Qaidi 2000"
4.2.13. *+M (oneclass)
!u and S+ C'o2001"+ .t inc$udes an a$gorit'm named support;#ector mac'ine !S?M"+ ,
Hone;c$assJ S?M was made on$y %or t'e purpose o% anoma$y detection+ est #ector is
projected into t'e same 'ig';dimensiona$ space and t'e !signed" distance %rom t'e $inear
20
8/12/2019 c Se Project
21/46
separator is ca$cu$ated+ H'e anoma$y score is ca$cu$ated as t'is distance wit' t'e sign
in#erted so t'at positi#e scores are separated %rom t'e data+J !u and S+ C'o2001"+
4.2.14. $means
!)ang S+ 8wang and S+ C'o200"+ 'e c$usters in t'e training #ectors are identi%ied
using t'e k;mean c$uster a$gorit'm+t'en it %ind out weat'er t'e test #ector is c$ose to any
o% t'e c$usters+ H'e anoma$y score is ca$cu$ated as t'e Euc$idean distance &etween t'e
test #ector and t'e nearest o% t'ese centroids+J !)ang S+ 8wang and S+ C'o200"+
0.3
21
8/12/2019 c Se Project
22/46
8/12/2019 c Se Project
23/46
4.3.1. ,he result of the com-arison sho#n belo# in fi!ure 8/
2
8/12/2019 c Se Project
24/46
Figure $
Source: Reference (web: 0#)
Figure %:Fa&se &ar' Rate
Source: Reference (web: 0#)
29
8/12/2019 c Se Project
25/46
4.3.2. ther researchers #ith the al!orithm com-arison.
Continuous researc' carried out &y ot'ers !)i$$our'y 2010" came into a conc$usion wit'
t'e same resu$t +'e %igure &e$ow $ustrates t'e %inding+
Figure 10: Sows te etectors "rror Rate
Source: Reference (*i&&our+! 2010)
2-
8/12/2019 c Se Project
26/46
,s per t'e a&o#e resu$t &est eua$;error rate was 0+04 it was o&tained &y t'e Man'attan
!sca$ed" detector said &y ,raPujo+ !,raPujo Sucupira i=Parraga
ing and a&u;uti2009"+ Nearest Neig'&or !Ma'a$ano&is" detector it was t'e topper%orming as it 'ad t'e >ut$ier Count as we$$ as t'e top per%orming detector using t'e
eua$;error per%ormance measure+
>ne and on$y &est =ero;miss %a$se a$arm rate was 0+93w'ic' was &y t'e Nearest
Neig'&or !Ma'a$ano&is" as mentioned &y C'o+!C'o 8an 8an and )im 2000"
By $ooking into t'e ta&$es t'e initia$ o&ser#ation was t'at t'e per%ormance measure
needed to ac'ie#e t'e 0+001 miss rate and 1 %a$se;a$arm reuired &y t'e European
standard %or access;contro$ system+! CENEEC+2002"
Nearest Neig'&or !Ma'a$ano&is" detector was t'e one and on$y top among t'e &ot'
per%ormance measures+!eua$ 6error rate and =ero miss %a$se;a$arm rate" measure detector
%rom a di%%erent ang$e o% t'e operating points on an >C cur#e as s'own in %igure(4* t'is
indi#idua$ resu$t suggest t'at t'e Nearest Neig'&or !Ma'a$ano&is" detector wou$d &e
ro&ust to di%%erent t'res'o$d;se$ection procedures+
'is make up t'e %ina$ ana$yse t'at t'e Nearest Neig'&or!Ma'a$ano&is"detector is t'e
&est a$gorit'm %or )eystroke dynamics+
2
8/12/2019 c Se Project
27/46
'. Key (nvironmental factors affectin# Keystroke Dynamics.
Figure 11: "nviron'enta& factors effecting te *e+stro,e +na'ics
Source: Reference (*i&&our+.200$)
7.1 *!oc$ eso!ution is one of the ma6or /actors which affect the ,eystro$e
-ynamics.
' research carried out ()i$$our'y+2003" &y )i$$our'y a&out t'e %actors e%%ecting )D
came into conc$usion c$ock reso$ution was one o% t'e major %actor+ ,s s'own in %igure
&e$ow (11 121*Eample sho"n in figure )10* eplains ho" important the cloc+
resolutions for ,eystro+e Dynamics is important !The pass"ord for -oth 'lice and
.o- it the same /pass"ord! 's in figure 10 .o- cant access 'lice system "ere as in
figure 11 .o- could access her system as the cloc+ resolution is lees and comes
matching "ith 'lice !
2
8/12/2019 c Se Project
28/46
Figure 12: Sowing iger c&oc, reso&ution -reventing ob fro' accessing &ice/s
s+ste'
Source: Reference (*i&&our+.200$)
23
8/12/2019 c Se Project
29/46
Figure 13: Sowing &ess c&oc, reso&ution an ob cou& access &ice/s s+ste'
Source: Reference (*i&&our+.200$)
24
8/12/2019 c Se Project
30/46
Figure 14: Sows iger c&oc, reso&ution i'-roves -erfor'ance
Source: Reference (*i&&our+.200$)
). *oft+are Development.
8.1 Phase one 5 *reation of the data co!!ection and ana!ysis software with "raph
to reco"nise the typin" rhythms of different person.
6.1.1 *oft#are a--lication and 0ard#are used
rogram used for "riting soft"are 3icrosoft isual studio 200%
For functions5methods used 3icrosoft Frame"or+ 6D, 7!%
0
8/12/2019 c Se Project
31/46
User interface 89indo"s forms
6ource code at the end of the -oo+ at page no!
6.1.2 0 ,0E *&,E * &,E ME*9N
Figure 15: e co'-&ete software in its new &oo,
6.1.3 a-abilit of the soft#are
The soft"are sho"n a-oe is capa-le of ma+ing graphical representation of
,eystro+es Dynamics "hile typing! :t could record and store them in a data-ase
"hich could -e analy;ed for later use! :t has the a-ility to record!
Time -et"een t"o +eys pressed
8/12/2019 c Se Project
32/46
Time -et"een one release and one pressurea" press
>a" release
raph could -e ;oomed to see the correct accurate measurement
raphs could -e saed as picture file for later reference or use!
8.1.0 Pictures be!ow shows a features of the software
2
8/12/2019 c Se Project
33/46
Figure 16: Sows te gra- wic re-resents a&& te attributes
'e grap' now 'as t'e image o% sing$e user trained and w'o 'as typed t'e password
H,,@@,J %or -0 times+ 'e image &e$ow wi$$ demonstrate 'ow it $ooks in t'e grap'
w'en a di%%erent user tries to $og in wit' t'e same password+ (
8/12/2019 c Se Project
34/46
Figure 1#: Sows te gra- wic re-resents a&& te attributes
'is image %igure (1* s'ows t'ree ot'er users w'ic' 'a#e tried to $og in wit' t'e same
password+ But t'e grap' s'ows us t'e #ariation in )eystroke Dynamics wit' t'e o$d users
w'o 'a#e &een trained to type 'is password+
9
8/12/2019 c Se Project
35/46
Figure 1$: erification rocess Sows istance reaing
8/12/2019 c Se Project
36/46
Figure 1%: Sows te vector recore an oter ata besie
te'.
8/12/2019 c Se Project
37/46
8.1.7 +ow these data can be usefu!.
Figure 20
Source: Reference (web: 0$)
8/12/2019 c Se Project
38/46
6.1.6 :E*9;N & ,0E E
8/12/2019 c Se Project
39/46
4
8/12/2019 c Se Project
40/46
Phase two % mp!ementation of a software for $eystro$e dynamic authentication
So%tware wou$d run as a c$ient ser#er approac'+ 5'en t'e c$ient try to $og in t'e ser#er
wou$d gi#e out t'e password %or aut'enticating+ 'e main a&i$ity o% t'is app$ication is to
aut'enticate using t'e tec'no$ogy keystroke dynamics+
Bui$d 6 it is &ui$d in ja#a
i&raries and ot'er needed 6 $atest jcommon and j%reec'artjdk new
,dditiona$ reuirement 6 Data&ase to &e insta$$ed+
Ser#er notes attac'ed $ast page+
90
8/12/2019 c Se Project
41/46
,onclusion
.n conc$usion t'e researc' in t'e ,$gorit'm shows us that Nearest Neig'&or
!Ma'a$ano&is" is one o% t'e &est ,$gorit'ms %or &e'a#ioura$ &iometric aut'entication
o% $eystro$e dynamic system as it is topped out performed in equal-error rate and
zero-miss false-alarm ratew'ic' makes it one o% t'e &est+ By t'e demonstration o% t'e
so%tware s'ows 'ow t'e tec'no$ogy in t'e present day 'as &ecome it cou$d at $east
reac' to a certain etent+ 'e work input and process created &y t'e users t'at
continues to proceed in a way t'at is not t'e most e%%icient concerning security+
,ssuming 'uman &e'a#iour as a %act di%%erent ways are $ooked into to reac' %or t'e
&est o% practices in security $ike now comp$e passwords is used %rom t'e users w'o
used norma$ and traditiona$ met'ods o% passwords+ 'e &e'a#ioura$ &iometric wou$d
&e t'e &est in t'e day a'ead+
91
8/12/2019 c Se Project
42/46
8/12/2019 c Se Project
43/46
yping Biometrics &aidat M S !144-" , #eri%ication met'odo$ogy %or computer systems users+ @roceedings
o% t'e 144- ,CM
symposium on ,pp$ied computing+ pp+ 2-3 ; 22
D+Fmp'ress+ and A+5i$$iams!143-"H.dentity #eri%ication t'roug' key&oard
c'aracteristicsJ+ .nternat+ O+ManMac'+Stud+2262+143-
>&aidat M+S+ Sadoun B+: ?eri%ication o% computer users using keystroke dynamics+
.EEE ransactions on Systems Man and Cy&ernetics 2 !144" 21624
Mi$$er B+: ?ita$ signs o% identity+ .EEE Spectrum 1 !1449" 2260
Simon iu and Mark Si$#erman , @ractica$ Auide to Biometric Security ec'no$ogy+
.EEE . @ro%essiona$ ?o$ume Num&er 1!2001"2;2
awrence >GAorman ,#aya a&s esearc' Basking idge NO+ Securing BusinessGs
8/12/2019 c Se Project
44/46
S+ B$e'a C+ S$i#insky and B+ 8ussien+ Computeraccess security systems using keystroke
dynamics+ .EEE ransactions on @attern ,na$ysis and Mac'ine .nte$$igence
12!12":12161222 1440+
+ Ooyce and A+ Aupta+ .dentity aut'entication &ased on keystroke $atencies+
Communications o% t'e ,CM!2":1361 1440+
+ C+ rgani=ationa$ Computing and E$ectronic
Commerce 10!9":24-60 2000+
S+ 8aider ,+ ,&&as and ,+ )+ Qaidi+ , mu$ti;tec'niue approac' %or user identi%ication
t'roug' keystroke dynamics+.EEE .nternationa$ Con%erence on Systems Man and
Cy&ernetics pages 16191 2000+
B+ 8wang and S+ C'o+ C'aracteristics o% auto;associati#e M@ as a no#e$ty detector+ .n
@roceedings o% t'e .EEE .nternationa$ Ooint Con%erence on Neura$ Networks #o$ume -
pages 036041 1061 Ou$y 14445as'ington DC 1444+
E+ u and S+ C'o+ A,;S?M wrapper approac' %or %eature su&set se$ection in keystroke
dynamics identity #eri%ication+ .n @roceedings o% t'e .nternationa$ Ooint Con%erence on
Neura$ Networks !.OCNN" pages 22-622-+ .EEE @ress 200+
@+ )ang S+ 8wang and S+ C'o+ Continua$ retraining o% keystroke dynamics &ased
aut'enticator+ .n @roceedings o% t'e 2nd .nternationa$ Con%erence on Biometrics !.CBG0"
pages 12061211+ Springer;?er$ag Ber$in 8eide$&erg 200+
99
8/12/2019 c Se Project
45/46
O+ ,+ Swets and + M+ @ickett+Evaluation of Diagnostic Systems !ethods from Signal
Detection "heory+ ,cademic@ress New ork 1432
)e#in )i$$our'y+!2003",.D U03 @roceedings o% t'e 11t' internationa$ symposium on
ecent ,d#ances in .ntrusion Detection
)e#in )i$$our'y!2010"5'y Did My Detector Do 'at7V@redicting )eystroke;Dynamics
Error ates+,.D
CENEEC+ European Standard EN -01;1: ,$arm systems+ ,ccess contro$ systems %or
use in security app$ications+ @art 1: System reuirements 2002+ Standard Num&er
EN -01;1:144/,1:2002 ec'nica$ Body CC/C4 European Committee %or
E$ectrotec'nica$ Standardi=ation !CENEEC"+
#ebPa"es Accessed:
5e&+01: #$dentity %ard& (,ccessed on 1-;09;2011 at 1+00pm* a#ai$a&$e on WFX
'ttp://we&arc'i#e+nationa$arc'i#es+go#+uk/20110104112-4/'ttp://ips+go#+uk/cps/rde/c
'g/ipsY$i#e/'s+s$/-+'tm
5e&+02:#'ouse of common& (,ccessed on 1-;09;2011 at 2+00pm* a#ai$a&$e on WFX
we&:'ttp://www+pu&$ications+par$iament+uk/pa/cm200-0/cm&i$$s/094/200094+'tm
5e&+0: #"elegraph& (,ccessed on 14;09;2011 at +00pm* a#ai$a&$e on WFX
'ttp://www+engadget+com/200-/0-/0/morse;code;trumps;sms;in;'ead;to;'ead;
speed;teting;com&at/
5e&+09:#9estern Carolina Uniersity& (,ccessed on 20;09;2011 at 10+00pm* a#ai$a&$e on
WFX http55et!"cu!edu5aidc5.io9e-ages5.iometrics,eystro+e!html
9-
8/12/2019 c Se Project
46/46
5e&+0-:#Biometric $dentification()uthentication "echniques& (,ccessed on 21;09;2011
at -+00pm* a#ai$a&$e on WFX
'ttp://www+a$tisinc+com/resources/Biometric/tec'niues+p'p
5e&+0: #biometric solution& (,ccessed on 22;09;2011 at 1+00pm* a#ai$a&$e on
WFX 'ttp://www+&iometric;so$utions+com/inde+p'p7storyper%ormanceY&iometrics
5e&+0: #*eystroke Dynamics - Benchmark Data SetJ (,ccessed on 2;0-;2011 at
4+00pm* a#ai$a&$e on WFX 'ttp://www+cs+cmu+edu/Zkeystroke/
5e&+03:#+ser authentication using keystroke
Dynamics for cellular phoneJ (,ccessed on 2;0-;2011 at 4+00pm* a#ai$a&$e on WFX
'ttp://ieeep$ore+ieee+org/stamp/stamp+jsp7arnum&er0-193