Behavior-based Authentication Systems. Multimedia Security

Size: px
Start display at page:

Download "Behavior-based Authentication Systems. Multimedia Security"

Transcription

1 Behavior-based Authentication Systems Multimedia Security

2 Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse Movements 2

3 User Authentication Through Typing Biometrics Features Lívia C. F. Araújo, Luiz H. R. Sucupira Jr., Miguel G. Lizárrage, Lee L. Ling, and João B. T. Yabu-Uti, Correspondence, IEEE Transactions on Signal Processing, vol. 53, no. 2, Feb. 2005,

4 Introduction The login-password authentication is the most usual mechanism used to grant access. low-cost familiar to a lot of users however, fragile (careless user / weak password) The paper provides better approach to improve above one using biometric characteristics. unique cannot be stolen, lost, forgotten 4

5 Introduction (cont.) The technology used is typing biometric, keystroke dynamics. monitoring the keyboard inputs to identify users based on their habitual typing rhythm pattern The method's advantages low-cost (using keyboard) unintrusive (using a password) using a static approach (using the login session) 5

6 Some Keywords Target String The input string typed by the user and monitored by system String length is important issue. (at least ten characters) Number of Samples Samples collected during the enrollment process to compound the training set Its number varies a lot. Features key duration (the time interval that a key remains pressed) keystroke latency (the time interval between successive keystrokes) 6

7 Some Keywords (cont.) Timing Accuracy The precision of the key-up and key-down times have to be analyzed. It varies between 0.1ms ad 1000ms. Trials of Authentication The legitimate users usually fail in the first of authentication. If the user still fail in the second time, he will be considered an impostor. Adaptation Mechanism Biometric characteristics changes over time. The system need updated. Classifier k-means, Bayes, fuzzy logic, neural networks, etc. 7

8 The Approach Proposed Get target string with at least ten characters. Get ten samples. (more than ten samples may annoy the users) Analysis features: (The combination of these features is novel in this paper.) key code two keystrokes latencies key duration 1-ms time accuracy is used. An adaptation mechanism is used to update template. 8

9 Flowchart of the Methodology 9

10 Main Issue Timing Accuracy Keystroke Data Features Template Classifier Adaptation Mechanism 10

11 Timing Accuracy Since 98% of the samples' value are between 10 and 900ms, 1-ms precision is used. 11

12 Keystroke Data m characters, n keystrokes (m n) sample w, account a K { k ( a, w), k ( a, w),..., k ( a, w)}, w 1 2 n a = Each is composed of k i ( a, w) t i down ( a, w), t ( a, w), c ( a, w) i up i 12

13 Features key code Ca, w = { c1( a, w), c2( a, w),..., cn( a, w)} down-down (DD) DD dd i a, w = { dd ( a, w) = t 1 ( a, w), dd i+ 1 down ( a, w) t ( a, w),..., dd ( a, w) up-down (UD) (This feature may be pos. or neg.) UD a, w = { ud 1 ud ( a, w) = t i n 1 down-up (DU) (key interval) DU du i 2 ( a, w), ud i+ 1 down 2 i down ( a, w) t ( a, w),..., ud i up ( a, w)} ( a, w) n 1 ( a, w)}, w { du1( a, w), du2( a, w),..., dun( a, w)} a = ( a, w) = t ( a, w) t ( a, w) i up i down 13

14 Features (cont.) The distance will be discussed later. 14

15 15 Template (constructed by ten samples) ),, ( : ), ( ), ( ) ( ) ( 10 1 ) ( or UD DU DD feat Feature j a feat j a feat j a feat i a feat j i a feat i i i = = = = μ σ μ

16 16 Classifier If, the sample is considered false. Otherwise, for each time feature, calculate the distance between template and samples. a w a C C, ) ( ) ( 1 ), ( ), ( ), ( 1 ), ( a feat a feat i i n i i feat i i w a feat w a d w a d n w a D σ μ = = =

17 Classifier (cont.) The sample will be considered true if D dd ( a, w) T dd ( a) D D du ud ( a, w) ( a, w) T T du ud ( a) ( a) A user s feature with a lower variance demands a higher threshold and vice versa. 17

18 Adaptation Mechanism d T i If feat ( a, w) feat( a), add this sample into template and discard the oldest one. The standard deviation for each feature is modified and the threshold are modified. 18

19 Experiements 30 users (men and women between 20 and 60 years old) Three situation Legitimate user authentication Imposter user authentication Observer imposter user authentication Seven experiments 1) only DD; 2) only UD; 3) only DU; 4) DD and UD; 5) DD and DU; 6) UD and DU; 7) DD, UD, and DU 19

20 Result False Acceptance Rate (FAR) False Rejection Rate (FRR) Zero FAR Zero FRR Equal Error Rate (EER) 20

21 1) Only DD time; 2) Only UD time; 3) Only DU time; 4) DD and UD times; 5) DD and DU times; 6) UD and DU times; 7) DD, UD, and DU times. 21

22 22

23 Discussion A target string with capital letters increases the difficulty of authentication. The familiarity of the target string to the user has a significant impact. (FRR 17.26%) One-trial authentication significantly increase the FRR. (FRR 11.57%) The adaptation mechanism decreases both rate. (FAR 4.70% FRR 4.16%) 23

24 Discussion (cont.) If the adaptation mechanism is always activated, the FAR increase a lot. (FAR 9.4% FRR 3.8%) A higher timing accuracy decreases both rate. (FRR 1.63% FAR 3.97) FRR increases as the number of samples is reduced. 24

25 25

26 26

27 Conclusion The method applied uses just one target string and ten samples in enrollment. The best performance was achieved using a statistical classifier base on distance and the combination of four feature (key code, DD, UD, DU times) which is novel, obtaining a 1.45% FRR and 1.89% FAR. This paper shows the influence of some aspects, such as the familiarity of the target string, the twotrial authentication, the adaptation mechanism, the time accuracy, the number of samples in enrollment. 27

28 User Re-Authentication via Mouse Movements Maja Pusara and Caria E.Brodley, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security

29 Outline Introduction User Re-Authentication via Mouse Movements An Empirical Evaluation Future work 29

30 Introduction(1/3) Why re-authentication? The purpose of a re-authentication system is to continually monitor the user s behavior during the session to flag anomalous behavior Defend insider attacks Ex. Forget to logout, forget to lock Ex. Employees, temporary workers, consultants. 30

31 Introduction(2/3) Traditional re-authentication Periodically ask the user to authentication via passwords, tokens,. Behavioral re-authentication Direct: keystroke, mouse,. Indirect: system call trace, program execution traces,. 31

32 Introduction(3/3) This paper Collect data form 18 users all working with Internet Explorer and browse the fixed webpages with fixed mouse device. 32

33 Roughly User Re-Authentication via Mouse Movements Data Collection and Feature Extraction Building a Model of Normal Behavior Anomaly Detection 33

34 User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(1/4) The cursor movement Examine whether the mouse has moved every 100msec. Record distance, angle, and speed. Extract mean, standard deviation, and the third moment values over a window of N data points. 34

35 User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(2/4) The mouse event NC area: the area of the menu and toolbar 35

36 User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(3/4) The mouse event Record time of the event. Record distance, angle, and speed between pairs of data point A and B, where B occurs after A. Calculate the value every f (frequency) data points. Extract mean, standard deviation, and the third moment values over a window of N data points 36

37 User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(4/4) Summary of feature extraction The # of observed events in the window. (6) -events. The mean, standard deviation, and the third moment of the distance, angle, and speed between pairs of points. ( 3 * 3 * (6+1) ) - cursor & events. The mean, standard deviation, and the third moment of the X and Y coordinates. ( 3 * 2 * (6+1) ) - cursor & events. 37

38 User Re-Authentication via Mouse Movements Building a Model of Normal Behavior(1/1) Using supervised learning algorithm Specify the window size N Specify frequency for every categories 38

39 User Re-Authentication via Mouse Movements Anomaly Detection(1/1) Simple method Trigger an alarm each time a data point in the profile is classified as anomalous Smooth filter Require t alarms to occur in m observations of the current user s behavior profile. If it is anomalous : asks the user to authenticate again or reports the anomaly to a system administrator. 39

40 An Empirical Evaluation(1/6) The goal of our experiments is to determine whether a user x when running an application (e.g., Internet Explorer) can be distinguished from the other n-1 users running the same application. 40

41 An Empirical Evaluation(2/6) 2/4 for training, 1/4 for parameter selection, 1/4 for testing. Data Sources 18 students unique cursor locations The same set of web pages Windows Internet Explorer Parameter selection Frequency: 1,5,10,15,20 Window size: 100,200,400,600,800,1000 Smoothing filter m: 1,3,5,7,9,11 41

42 An Empirical Evaluation(3/6) Decision Tree Classifier 42

43 An Empirical Evaluation(4/6) Pair-Wise Discrimination: Distinguish two people #6 and #18 with too few mouse movements 43

44 An Empirical Evaluation(5/6) Anomaly Detection: False positive rate: authorized user -> intruder False negative rate: intruder -> authorized user A high false positive rate means too few mouse events 44

45 An Empirical Evaluation(6/6) Smoothing Filter: 45

46 Future work Research the impact of replay attacks How best to apply unsupervised learning How to incorporate the results from different sources. (ex keystroke, mouse) 46

US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004)

US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) US Secret Service National Threat Assessment Center (NTAC), Insider threat study (2004) 83% of incidents executed from within organization, during normal business hours Financial loss in almost all insider

More information

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication

Technical White Paper. Behaviometrics. Measuring FAR/FRR/EER in Continuous Authentication Technical White Paper Behaviometrics Measuring FAR/FRR/EER in Continuous Authentication Draft version 12/22/2009 Table of Contents Background... 1 Calculating FAR/FRR/EER in the field of Biometrics...

More information

Authentication by Mouse Movements. By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004

Authentication by Mouse Movements. By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004 Authentication by Mouse Movements By Shivani Hashia Advisor: Dr. Chris Pollett Committee: Dr. Mark Stamp Dr. Robert Chun Dec 2004 Topics Introduction Design and Implementation Active authentication Passive

More information

A Biometric Authentication System That Automatically Generates Feature Points

A Biometric Authentication System That Automatically Generates Feature Points A Biometric Authentication System That Automatically Generates Feature Points Hiroshi Dozono 1, Youki Inaba 1, Masanori Nakakuni 2 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

User Authentication Based On Keystroke Dynamics

User Authentication Based On Keystroke Dynamics RESEARCH ARTICLE OPEN ACCESS User Authentication Based On Keystroke Dynamics J.R Nisha 1, R.P. Anto Kumar 2 1 PG Student, Dept. of computer science and Engineering, St. Xavier s Catholic College of Engineering,

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

This is the published version of this conference paper:

This is the published version of this conference paper: QUT Digital Repository: http://eprints.qut.edu.au/ This is the published version of this conference paper: Al solami, Eesa and Boyd, Colin and Clark, Andrew and Khandoker, Asadul Islam (2010) Continuous

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger.

Chapter 2: Access Control and Site Security. Access Control. Access Control. ACIS 5584 E-Commerce Security Dr. France Belanger. Chapter 2: Access Control and Site Security ACIS 5584 E-Commerce Security Dr. France Belanger Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall Access Control Definitions Access

More information

An Enhanced Non-Static Biometric Keystroke Dynamics Model for Strengthening the Information Content Security

An Enhanced Non-Static Biometric Keystroke Dynamics Model for Strengthening the Information Content Security International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 An Enhanced Non-Static Biometric Keystroke Dynamics Model for Strengthening the Information Content Security Saleh M.

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

A study of the Graphical User Interfaces for Biometric Authentication System

A study of the Graphical User Interfaces for Biometric Authentication System A study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono 1, Takayuki Inoue 1, Masanori Nakakun 2 i 1 Faculty of Science and Engineering, Saga University, 1-Honjyo Saga,

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

Client Dependent GMM-SVM Models for Speaker Verification

Client Dependent GMM-SVM Models for Speaker Verification Client Dependent GMM-SVM Models for Speaker Verification Quan Le, Samy Bengio IDIAP, P.O. Box 592, CH-1920 Martigny, Switzerland {quan,bengio}@idiap.ch Abstract. Generative Gaussian Mixture Models (GMMs)

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied

More information

Undergraduate programme in Computer sciences

Undergraduate programme in Computer sciences What is authentication? Security Engineering MSc in Computer Science EIT Master on Security and Privacy Lecture 12 Authentication Massacci Fabio It is the process of verifying a claimed identity by r for

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

Authentication by Mouse Movements. CS 297 Report. Shivani Hashia Advisor: Dr.Chris Pollett. May 2004

Authentication by Mouse Movements. CS 297 Report. Shivani Hashia Advisor: Dr.Chris Pollett. May 2004 Authentication by Mouse Movements CS 297 Report by Shivani Hashia (shivani_hash@hotmail.com) Advisor: Dr.Chris Pollett May 2004 Authentication by Mouse Movements By Shivani Hashia Abstract Security systems

More information

A Study on the Consistency of Features for On-line Signature Verification

A Study on the Consistency of Features for On-line Signature Verification A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Authentication Manager Self Service Password Request Administrator s Guide

Authentication Manager Self Service Password Request Administrator s Guide Authentication Manager Self Service Password Request 9.0.2 Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

A Correlation Framework for Continuous User Authentication Using Data Mining

A Correlation Framework for Continuous User Authentication Using Data Mining A Correlation Framework for Continuous User Authentication Using Data Mining H. Singh 1, S.M. Furnell 2, P.S. Dowland 2, B. Lines 2 and S. Kaur 3 1 School of Computing Science, Middlesex University, London,

More information

Screen Fingerprints: A Novel Modality for Active Authentication

Screen Fingerprints: A Novel Modality for Active Authentication Security: DArPA Screen Fingerprints: A Novel Modality for Active Authentication Vishal M. Patel, University of Maryland, College Park Tom Yeh, University of Colorado, Boulder Mohammed E. Fathy and Yangmuzi

More information

Empirical Study of Automatic Dataset Labelling

Empirical Study of Automatic Dataset Labelling Empirical Study of Automatic Dataset Labelling Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish School of Electronic, Electrical and System Engineering Loughborough University

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Behavioural Biometrics in the World Wide Web

Behavioural Biometrics in the World Wide Web Behavioural Biometrics in the World Wide Web Master of Informatics Engineering Thesis Report Leandro Silva lasilva@student.dei.uc.pt Supervisors: Bernardo Patrão Ernesto Costa Date: July 01 st, 2014 Abstract

More information

How accurate is AGNITIO KIVOX Voice ID?

How accurate is AGNITIO KIVOX Voice ID? How accurate is AGNITIO KIVOX Voice ID? Overview Using natural speech, KIVOX can work with error rates below 1%. When optimized for short utterances, where the same phrase is used for enrolment and authentication,

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service ViGo Architecture and Principles Mobile Voice Biometrics as-a-service Part number: VV/VIGO/DOC/183/C Copyright 2015 VoiceVault Inc. All rights reserved. This document may not be copied, reproduced, transmitted

More information

Biometric verification of computer users with probabilistic and cascade forward neural networks

Biometric verification of computer users with probabilistic and cascade forward neural networks Biometric verification of computer users with probabilistic and cascade forward neural networks S. SHORROCK, A. YANNOPOULOS, S.S. DLAY, D.J. ATKINSON Department of Electrical & Electronic Engineering University

More information

Facial & Fingerprint Recognition Product

Facial & Fingerprint Recognition Product Facial & Fingerprint Recognition Product Series User Manual Version: 1.1.7 Date: January 2010 About This Manual This document introduces the user interface and menu operations of the Facial & Fingerprint

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

Human user authentication based on mouse dynamics: a feasibility study

Human user authentication based on mouse dynamics: a feasibility study Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2015 Human user authentication based on mouse dynamics: a feasibility study Xuantong Zhang Iowa State University

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

Check Point GO R75. User Guide. 14 November Classification: [Public]

Check Point GO R75. User Guide. 14 November Classification: [Public] Check Point GO R75 User Guide 14 November 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

Prevention or Identification of Web Intrusion via Human Computer Interaction Behaviour A Proposal

Prevention or Identification of Web Intrusion via Human Computer Interaction Behaviour A Proposal Human Computer Interaction Behaviour A Proposal Hugo Gamboa 1, Ana Fred 2 and António Alves Vieira 1 [ 1 ]Escola Superior de Tecnologia de Setúbal Campus do IPS Estefanilha Setúbal, Portugal Tel +351 265790000,

More information

Course Description. Audience. Prerequisites. At Course Completion. : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs

Course Description. Audience. Prerequisites. At Course Completion. : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs Module Title Duration : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs : 4 days Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize

More information

Intruders, Human Identification and Authentication, Web Authentication

Intruders, Human Identification and Authentication, Web Authentication Intruders, Human Identification and Authentication, Web Authentication David Sanchez Universitat Pompeu Fabra 06-06-2006 Lecture Overview Intruders and Intrusion Detection Systems Human Identification

More information

My Access 1/12 User Guide

My Access 1/12 User Guide My Access 1/12 Purpose Our new MyAccess self-service IT portal offers secure and simplified access to your personal account information. This Quick Reference Guide on it is intended for all SWISS as well

More information

Behavioral Biometrics

Behavioral Biometrics White Paper Behavioral Biometrics Balancing security with usability 1 Abstract Behaviometrics, or behavioral biometrics, is a measurable behavior used to recognize or verify the identity of a person. Behaviometrics

More information

Continuous User Authentication Using Temporal Information

Continuous User Authentication Using Temporal Information Continuous User Authentication Using Temporal Information Koichiro Niinuma a, Anil K. Jain b a Fujitsu Laboratories, Kawasaki, Japan; b Department of Computer Science & Engineering, Michigan State University,

More information

Network Security. Course notes. Version

Network Security. Course notes. Version Network Security Course notes Version 2013.1 2 Contents 1 Firewalls 1 1.1 Location of a firewall................................... 2 2 Intrusion Detection 3 2.1 Concepts of Intrusion detection.............................

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Biometrics Authentication Using Touch-Based Gesture Features for Intelligent Mobile Devices

Biometrics Authentication Using Touch-Based Gesture Features for Intelligent Mobile Devices 1 st International Conference of Recent Trends in Information and Communication Technologies Biometrics Authentication Using Touch-Based Gesture Features for Intelligent Mobile Devices Ala Abdulhakim Alariki

More information

Body Sensor Network Security

Body Sensor Network Security 1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

AAT Online Platform User Guideline

AAT Online Platform User Guideline AAT Online Platform User Guideline INDEX Notes to users... 2 Account activation / Forget password... 3 Account Login... 7 Account Logout... 8 Amending the Personal information (Correspondence address &

More information

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200

Technical Report. Cross-Sensor Comparison: LG4000-to-LG2200 Technical Report Cross-Sensor Comparison: LG4000-to-LG2200 Professors: PhD. Nicolaie Popescu-Bodorin, PhD. Lucian Grigore, PhD. Valentina Balas Students: MSc. Cristina M. Noaica, BSc. Ionut Axenie, BSc

More information

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia BiDA Lab- Biometrics and Data Pattern Analytics

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

CSci530 Final Exam. Fall 2011

CSci530 Final Exam. Fall 2011 CSci530 Final Exam Fall 2011 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on

More information

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help, please contact Hangzhou

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

TECHNICAL NOTES. Player Security Statement. BrightSign, LLC Lark Ave., Suite 200 Los Gatos, CA

TECHNICAL NOTES. Player Security Statement. BrightSign, LLC Lark Ave., Suite 200 Los Gatos, CA TECHNICAL NOTES Player Security Statement BrightSign, LLC. 16795 Lark Ave., Suite 200 Los Gatos, CA 95032 408-852-9263 www.brightsign.biz INTRODUCTION The network settings of a BrightSign player are highly

More information

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process... TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process

More information

Proper user identification is essential for reliable

Proper user identification is essential for reliable Toward Reliable User Authentication through Biometrics Biometric authentication systems identify users by their measurable human characteristics. Although biometrics promise greater system security because

More information

INVISIBLE CHALLENGES by BioCatch, The Cognitive Biometrics Company.

INVISIBLE CHALLENGES by BioCatch, The Cognitive Biometrics Company. INVISIBLE CHALLENGES by BioCatch, The Cognitive Biometrics Company. October, 2014 White Paper 1 EXECUTIVE SUMMARY In today s world, personal passwords are relatively easy to crack. Fraudsters are continuously

More information

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters

Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) mposters P. A. Johnson, B. Tan, S. Schuckers 3 ECE Department, Clarkson University Potsdam, NY 3699, USA johnsopa@clarkson.edu tanb@clarkson.edu

More information

Forwarded Received Parked Files Closed Files Reports under Receipts Section Diary... 67

Forwarded Received Parked Files Closed Files Reports under Receipts Section Diary... 67 Table of Contents Introduction... 5 efile Modules... 6 Receipts... 7 Browse & Diarise... 8 Email Diarisation... 16 Created... 20 Sent... 23 Closed... 25 Acknowledgement... 26 Recycle Bin... 27 Actions

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

A Defense System for DDoS Application Layer Attack Based on User Rating

A Defense System for DDoS Application Layer Attack Based on User Rating 4th International Conference on Advanced Materials and Information Technology Processing (AMITP 216) A Defense System for DDoS Application Layer Attack Based on User Rating Gaojun Jiang1, a, Zhengping

More information

DRKS Online-Help - Public Area

DRKS Online-Help - Public Area DRKS Online-Help - Public Area Contents Overview... 2 User registration... 2 User account data... 3 Password... 3 Password confirmation... 3 Security check... 3 Allow automatic interim saving... 4 Address

More information

Getting started with my.acap

Getting started with my.acap Getting started with my.acap A resource for Students, including: 1. Logging in to my.acap 2. Accessing your Classes 3. Participant Profiles a. Updating your own Profile 4. Announcements and Discussion

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

Advanced ASP.NET Identity. Brock Allen

Advanced ASP.NET Identity. Brock Allen Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen

More information

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,

More information

FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface

FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface Duo Lu Arizona State University duolu@asu.edu Dijiang Huang Arizona State University dijiang.huang@asu.edu arxiv:1808.00130v1

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT

Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT 1 Gummadidala Ravi Babu, 2 Nagandla Prasad 1 (M.Tech),DECS, Sai Thirumala NVR engineering College, Narasaraopeta, AP, INDIA. 2 Asst

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Continuous user authentication using multi-modal biometrics

Continuous user authentication using multi-modal biometrics Continuous user authentication using multi-modal biometrics Hataichanok Saevanee 1, Nathan Clarke 1, 3, Steven Furnell 1, 3, Valerio Biscione 2 1 Centre for Security, Communications and Network Research,

More information

Background: Bioengineering - Electronics - Signal processing. Biometry - Person Identification from brain wave detection University of «Roma TRE»

Background: Bioengineering - Electronics - Signal processing. Biometry - Person Identification from brain wave detection University of «Roma TRE» Background: Bioengineering - Electronics - Signal processing Neuroscience - Source imaging - Brain functional connectivity University of Rome «Sapienza» BCI - Feature extraction from P300 brain potential

More information

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE 22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot

More information

Gaithashing: a two-factor authentication scheme based on gait features

Gaithashing: a two-factor authentication scheme based on gait features Gaithashing: a two-factor authentication scheme based on gait features Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis Department of Digital Systems, University of Piraeus, Piraeus, Greece

More information

arxiv: v2 [cs.cr] 8 Oct 2012

arxiv: v2 [cs.cr] 8 Oct 2012 Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song UC Berkeley, German Research

More information

Technical Users Guide for the Performance Measurement Accountability System. National Information Center For State and Private Forestry.

Technical Users Guide for the Performance Measurement Accountability System. National Information Center For State and Private Forestry. PMAS Technical Users Guide for the Performance Measurement Accountability System National Information Center For State and Private Forestry Prepared By Peter Bedker Release 2 October 1, 2002 PMAS User

More information

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks

An improved security model for identity authentication against cheque payment fraud in Tanzanian banks An improved security model for identity authentication against cheque payment fraud in Tanzanian banks Feno Heriniaina, R. 1 * Kitindi, Edvin 2 1. College of Computer Science, Chongqing University, Chongqing-

More information

SOFTWARE DEMONSTRATION

SOFTWARE DEMONSTRATION SOFTWARE DEMONSTRATION IDENTITY AND ACCESS MANAGEMENT SOFTWARE AND SERVICES RFP 644456 DEMONSTRATION AGENDA Executive Summary Technical Overview Break User Interfaces and Experience Multi-Campus and Inter-Campus

More information

IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION

IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION C. Örencik, T. B. Pedersen, E. Savaş and M. Keskinoz Faculty of Engineering & Natural Sciences, Sabanci University, Istanbul, 34956, Turkey {cengizo@su.,

More information

Keystroke Dynamics on a Mobile Handset: A Feasibility Study

Keystroke Dynamics on a Mobile Handset: A Feasibility Study Keystroke Dynamics on a Mobile Handset: A Feasibility Study N.L. Clarke, S.M. Furnell B.M. Lines and P.L. Reynolds Network Research Group, Department of Communication and Electronic Engineering, University

More information

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors

More information

Benefit: Transparent collection

Benefit: Transparent collection Benefit: Transparent collection No hit on usability Challenge: Intrinsic behavioral variability Intrinsic human factors Biological or emotional status of the user External environmental variables Software

More information

Parish . User Manual

Parish  . User Manual Parish Email User Manual Table of Contents LOGGING IN TO PARISH EMAIL... 3 GETTING STARTED... 3 GENERAL OVERVIEW OF THE USER INTERFACE... 3 TERMINATE THE SESSION... 4 EMAIL... 4 MESSAGES LIST... 4 Open

More information

Access Gateway Client User's Guide

Access Gateway Client User's Guide Sysgem Access Gateway Access Gateway Client User's Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem

More information

Evaluating and Reviewing Proposals in PAPERS

Evaluating and Reviewing Proposals in PAPERS Evaluating and Reviewing Proposals in PAPERS Contents Deadlines... 2 Logging In... 2 Welcome Page... 4 Rating and Commenting on Proposals... 5 Reviewing Papers Sessions.... 7 Anonymity and Ratings/Comments

More information

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data

More information