You are on page 1of 38

Keystroke Biometric

1
Outline
• Introduction
Overview of Biometrics
• Various approaches of research on
keystroke dynamics
Features/Attributes
Feature Extraction
Classification methods
• Advantages of keystroke dynamics

2
User Authentication Approaches

3
What is Biometric Authentication?

• An automatic method that identifies user


or verifies the identity
Involves something one is or does
• Types of Biometric
Physiological
Behavioural

4
Physiological characteristics
• Biological/chemical based
Finger prints
Iris, Retinal scanning
Hand shape geometry
blood vessel/vein pattern
Facial recognition
ear image
DNA

5
Behavioral characteristics
• A reflection of an individual’s psychology
Hand written signatures
Voice pattern
Mouse movement dynamics
Gait (way of walking)
Keystroke dynamics

6
Parameters:
• Universality - describes how commonly a biometric is
found individually.
• Uniqueness - how well the biometric separates individually
from another.
• Permanence - measures how well a biometric resists aging.
• Collectability - defines ease of acquisition for
measurement.
• Performance accuracy, speed, and robustness - practical
aspects of using specific biometric technology.

• Acceptability - degree of approval of a technology.

• Circumvention - defines ease of use of a substitute, in other


words, how easy it is to fraud specific biometric
characteristic.
Comparison of various biometric techniques

8
Keystroke History
• Typing rhythms is an idea whose origin lies in
the observation (made in 1897) that telegraph
operators have distinctive patterns of keying
messages over telegraph lines Behavioral
biometrics
• In keeping with these early observations,
British radio interceptors, during World War II,
identified German radio-telegraph operators by
their "fist," the personal style of tapping out a
message.
10
Keystroke Applications
• A Behavioral measurement aiming to identify
users based on typing pattern/ rhythms or
attributes
• Keystroke dynamics system different modes
• Identification mode (Find)
One-to-many
• Verification mode (Check)
One-to-one
• Non-repudiation

11
Keystroke Verification Techniques
• Static verification (Fixed text mode)
Only based on password typing rhythm
Authentication only at login time
• Dynamic verification (free text mode)
pattern regardless of the typed text
A continuous or periodic monitoring (On-the-fly
user authentication)
 not required to memorize a predetermined text
(username & password)

12
Biometric System

13
Continuous Biometric User Authentication in
online Examination (Dynamic):

• Currently, there are 4 primary methods for


user authentication:
 Knowledge factors, or something unique that the user knows
 Ownership factors, or something unique that the user hast
 Something unique that the user is
 Something unique that the user does

14
Some metrics for user verification in online
authentication:

• Typing speed
• Keystroke seek-time
• Flight time
• Characteristic sequences of keystrokes
• Examination of characteristic errors

15
Keystrokes Dynamics
• Converts biometric data to feature vector
can be used for classification
 Keystrokes latencies (fight)
Duration of a specific keystroke (dwell)
Pressure (Force of keystrokes)
Typing speed
Frequency of error
Overlapping of specific keys combinations
Method of error correction

16
Keystrokes Dynamics
Flight Time: Duration of pause between keystrokes-
keystrokes duration

Dwell Time: Duration of a specific keystroke –


keystrokes latencies or key-hold time

Pressure: energy you use to force on keys

Typing speed average number of keystrokes per time


interval
Keystrokes Dynamics
• Overlapping of specific keys combinations:
caused by fast typing and using ‘shift’ for
writing capital/small letters;

• Amount of errors: (in practical way detected


by usage of ‘delete’ or ‘backspace’ keys)

• Method of error correcting: (selecting text before or


deleting letters one by one
Keystroke analysis
• Variety of methods
Mean typing rate
Inter-interval comparison
Digraph
Trigraph
Mean error rate
etc

19
Keystroke analysis
• Digraphs & Trigraphs: – pairs & trios of letters
that frequently appear together. In English,
these inclue th, sh, tr, wh for digraphs and nth,
sch, scr, spl, spr, str, thr for trigraphs. More
generally, these are known as n-graphs.

20
Features & feature extraction method

21
Features & feature extraction method

22
Figures of Merit
• False Rejection Rate - type I error – FRR
False alarm
• False Acceptance Rate - type II error – FAR
Missed alarm
• Equal-error rate (EER) or Crossover Error
Rate (CER)
Different values of the operating threshold
may result in different values of FRR and FAR
To ensure comparability across different
systems
23
Statistical Methods
• Mean, standard deviation and digraph
• Geometric distance, Euclidean distance
• Degree of disorder
• k-Nearest neighbour approach
• Hidden Markov model
• N - graphys
• Manhattan distance
• Mean reference signature (mean & std)
24
Some Opportunities:
• Login information
Computer
Cell phones
Automated Teller Machine
Digital telephone dial
Digital electronic security keypad at a building
entrance
• Continuous authentication
Online examination

25
Advantages of keystroke dynamics
• Software Only method. (No Additional
Hardware except a Keyboard)
• Simple To Deploy and Use (username &
passwords) – Universally accepted
• Unobtrusive, Non-Invasive, Cost Effective
• No End-User Training
• It provides a simple natural way for
increased computer security
• Can be used over the internet
26
Keystroke drawbacks:
• User’s susceptibility to fatigue
• Dynamic change in typing patterns
• Injury, skill of the user
• Change of keyboard hardware.

27
Keystroke Challenges
• Lack of a shared set of standards for data
collection, benchmarking, measurement
• Which methods have lower error rate?
• Error rate comparison is difficult
• Work with very short sample texts
• There is no identical biometric samples
• Requires adaptive learning

28
Mouse Dynamics

30
Mouse Dynamics
• Mouse dynamics can be described as the
characteristics of the actions received from the
mouse input device for a specific user while
interacting with a specific graphical user interface.

• The first step in understanding the actions


received from the input device is to identify the
categories where those actions fall.
Mouse Actions
• A mouse action can be classified into one of
the following categories:
• Mouse-Move (MM): General mouse
movement,
• Drag-and-Drop (DD): the action starts with
mouse button down, movement, and then
mouse button up,
Mouse Actions

• Point-and-Click (PC):
– mouse movement followed by a click or a double
click, and
• Silence:
– no movement
Mouse Movement Direction
Mouse Movement Direction
• The directions are numbered from 1 to 8.

• Each of the eight directions covers a set of mouse


movements performed within a 45-degree area.

• For instance, direction number 1 represents all


actions performed with angles between 0 degree
and 45 degrees, whereas direction number 2 is
responsible for all
Mouse Dynamics Features
• The average speed for each distance traveled.

• The average speed in each of the eight


movement directions.

• The average traveled distance for a specific


period of time, with respect to different
movement directions.
Mouse Dynamics Features
Action Features Description
Left Click (LC) Click Time (CT) The time between the mouse down event and
the mouse up event

Traveled The distance traveled between the mouse down


Distance during event and the mouse up event.
Click (TDC)

Right Click Click Time (CT) The time between the mouse down event and
the mouse up event

Traveled The distance traveled between the mouse down


Distance during event and the mouse up event.
Click (TDC)
Mouse Dynamics Features
Action Features Description
Double First Click Time The time between the mouse- down and mouse-up events,
Click (FCT)
First Click Distance The distance traveled between the mouse-down and mouse-
(FCD) up events of the first click.
Interval Time (IT) The time interval between the first click and the second one
Interval Distance The distance traveled between the first click and the second
(ID) one
Second Click Time The time between the mouse-down and mouse-up events
(SCT)
Second Click The distance traveled between the mouse-down and
Distance mouse-up events of the second click.

You might also like