24
ANALYZING IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday, May 1, 2017

A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

Embed Size (px)

Citation preview

Page 1: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

ANALYZING IMPAIRED-USER INPUT SCENARIOS FOR KEYSTROKE BIOMETRIC AUTHENTICATION

Gonzalo Perez

J. Vinnie Monaco

Advisor – Dr. Charles Tappert

Friday, May 1, 2017

Page 2: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

KEYSTROKE BIOMETRIC RATIONALE

According to Roy Maxion a research professor of computer science at Carnegie Mellon, “Motions that are performed numerous times, are governed by motor control, not deliberate thought. That is why successfully mimicking keystroke dynamics is physiologically improbable.”

Page 3: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

FOCUS OF STUDY

The study examines how to better analyze abnormal typing behavior. Impaired Distracted

One-handed, typing behavior may not be performed numerous times and may not necessarily be governed by motor control.

One handed typing behavior has been found to be erratic when compared to standard two-handed typing behavior, and this study attempts to shed light as to how to better authenticate distracted or impaired typing scenarios.

Page 4: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

OVERALL GOAL

To strengthen current keystroke biometric systems by developing a model which will account for various impaired or distracted input scenarios.Other studies to further strengthen

keystroke biometrics include:EmotionWord QualityShort structured testsArbitrary Long-textStylometry

Page 5: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

OBJECTIVES

To better understand how a keystroke biometric system handles users that have been impaired or distracted.

Collect data by simulating a quiz to capture arbitrary free-text input from users entering data using various scenarios.

Run various experiments to determine which model best authenticates users.

Continuously analyze results from experiments and modify parameters to improve EER’s.

Page 6: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

IMPAIRED USER REQUIREMENTS BIOMETRIC RATIONALE

Research will focus on constrained user input Biometric systems need to consider user

requirements as users may have some physiological and medical factors that affect the usability and efficiency of biometrics: Visually Impaired Subjects

May suffer from Aniridia, absence of an iris Person may be blind Person may have eye tremors

Hearing Impairments Subject may not be able to hear instructions that are

needed for a biometric system Speech may be affected due to hearing loss

Page 7: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

IMPAIRED KEYSTROKE BIOMETRIC RATIONALE

A traditional keystroke biometric system would require the user to always input keystrokes in a normal state. (using both hands)

In a normal setting, users may type using one hand only if they are on the phone or drinking a cup of coffee or perhaps one hand or arm is injured.

To introduce various keystroke input methods in order to strengthen the validity of the keystroke biometric system

The study will analyze various keystroke input methods to determine if the user can still be authenticated or provide a new model.

Page 8: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

DATA CAPTURE- PARTICIPANTS Experiment featured 81 students which

successfully enrolled. Entered data as part of a simulated quiz The quiz format encouraged users to enter

arbitrary long-text input responses Various scenarios were introduced

Both Hand normal Left Hand Only Right Hand Only

Page 9: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

HARDWARE

Since the quizzes were taken towards the end of class session, 90% of users utilized an HP VMWare platform using a standard HP keyboard.

Some of the users could not complete the exam in class and had to use their laptop or desktop at home. The system prompts the users to identify which system they were using to enter their keystrokes.

Page 10: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

DPS DISSERTATION DATA CAPTURE MOODLE

Page 11: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

MOODLE DPS QUIZ

Students were asked to log into a Moodle learning platform which is an open source alternative from blackboard

Students were asked to complete three exams, each exam asking them to answer five questions related to the content that was being covered in the introductory computer science course. Every question in each exam was unique

Keystrokes were logged by a JavaScript event logging framework which was embedded into a Moodle learning platform

Page 12: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

DATA CAPTURED

81 Users entering at least 100 characters for every question in each scenario listed below Both Hands B Left Hand Only L Right Hand Only R

Page 13: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

FIRST ITERATIONEXPERIMENTS & RESULTS

After capturing the keystrokes from users through various normal and impaired scenarios, we began to run simulations: B train – B test B Train – L test B Train – R test

Initially, we were hoping to find decent results with this experiment and fine tune the dataset in order to provide a novel method to authenticate one hand only typing.

Page 14: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

FIRST ITERATIONEXPERIMENTS & RESULTS

Train data Test data Features EER (%)Both Both All 3.3Both Left All 38.04Both Right All 38

Table 1- First Iteration Results

Our results were not encouraging with this method as B Train, L and R Test gave us EER’s in the upper 38% range. Typing one handed proved significantly alter a user’s typing behavior and as a result gave us very poor EER rates

Page 15: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

SECOND ITERATIONEXPERIMENTS & RESULTS

Second experiment L Train, L Test R Train, R Test

As a result from our initial findings, we realized that one handed typing behavior was significantly different than the typing behavior of two handed typing.

Next we decided to experiment to determine if one handed typing behavior was so erratic, that it would be difficult to authenticate with the same one handed test sample.

Page 16: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

SECOND ITERATIONEXPERIMENTS & RESULTS

Train Data Test Data Features EER%Left Left All 13.96Right Right All 15.61

We were pleased to see the results of the single handed train and test data. The EER rates were relatively low, in the mid-teens which concludes that user one handed samples do have a conclusive pattern that can be analyzed and authenticated with a keystroke biometric system with relative efficacy. However, we wanted to try another experiment to determine if we could improve the error rate to a lower number if possible.

Page 17: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

THIRD ITERATIONEXPERIMENTS & RESULTS

Third Experiment: B train, L test, L Features B train, R test, R Features L train, L Test, L Features R Train, R Test, R Features

With the intent of lowering EER rates further, we wanted to experiment by filtering features which would better authenticate impaired users.

We created the feature sets for left/right sides by filtering the linguistics features to those that contain keys on each side of the keyboard

Page 18: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

THIRD ITERATIONEXPERIMENTS & RESULTS

Train Data Test Data Features EER%Both Left Left 35.85Both Right Right 36.79Left Left Left 22.75Right Right Right 26.64

• Much to our dismay, the left/right feature filter actually worsened the results of our testing. The initial hypothesis was that if a user is typing with one hand, they would perform more natural typing behavior on the segment of the keyboard with the one hand that they were typing with.

• Our results did not align with this hypothesis and the reason could be related to omission of the segments. Omitting a segment of the keyboard excludes many features of the keylogger system which degraded, not improved the results of the experiment.

Page 19: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

FOURTH ITERATIONEXPERIMENTS & RESULTS

The goal of a fourth iteration was to combine some of the datasets in order to exclude the need for a system to initiate a detector function and then engage various fallback procedures in order to authenticate a user.

Therefore, we combined all of the samples into one experiment which included approximately 1200 data points per user which needed to be split into 5 samples. The experiment was so large that it required two days to complete.

Page 20: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

FOURTH ITERATIONEXPERIMENTS & RESULTS

Train Data Test Data Features EER%Both-left-right Both-left-right All 12.41Both-left-right Both All 4.86Both-left-right Left All 15.82Both-left-right Right All 15.74

• The results were very encouraging as the EER’s were with the standard margin of error when comparing the training and testing conditions separately.

• Fewer assumptions are made with this method• The method does require that B, L, R samples be collected

during the enrollment phase.• System doesn’t need to know whether a sample is one-

handed when testing.• Avoids requiring a detector and fallback procedure for one-

handed samples.

Page 21: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

DISCUSSIONS

Each iteration provided valuable information which assisted us in expanding and developing the research

Initially, we expected to find patterns between the both hand sample and the one handed sample which could have been identified, isolated and matched accordingly.

One handed samples were too erratic and could not be matched with decent rates using our tools.

Keyboard segmentation actually worsened results. Combining B+L+R, and testing across all scenarios

proved to be the best approach that would authenticate users and provide a seamless test implementation process.

Page 22: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

CONCLUSION

The major contribution of this research study was to provide a novel approach to authenticate impaired users of a keystroke biometric system.

The research is an important step towards creating a more robust keystroke biometric system and is also an essential topic that must be considered when designing any biometric system, albeit physical.

Furthermore, our novel approach of combining datasets consisting of various scenarios and then subsequently testing across single scenarios can be an approach to consider for other behavioral biometric systems.

Page 23: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

BIOMETRIC IDENTIFICATION COMPETITION PAPER SUBMITTED TO ICB2015

A paper on one-handed keystroke biometrics which was based from our research was submitted and accepted to the International Conference on Biometrics (ICB 2015) in Phuket, Thailand.

We provided our unlabeled dataset and 9 teams from all over the world competed for the top spots.

Competition participants designed classification models trained on the normally-typed samples in an attempt to classify an unlabeled dataset that consists of normally-typed and one-handed samples.

Participants competed against each other to obtain the highest classification accuracies and submitted classification results through an online system.

Page 24: A NALYZING I MPAIRED -U SER I NPUT S CENARIOS FOR K EYSTROKE B IOMETRIC A UTHENTICATION Gonzalo Perez J. Vinnie Monaco Advisor – Dr. Charles Tappert Friday,

RESEARCH POSTER PRESENTATION DESIGN © 2012

www.PosterPresentations.com

Is it possible for a keystroke biometric system to give accurate results when typing behavior is severely impaired?

This competition aimed to answer that question. Participants built classifiers using a labeled keystroke biometric dataset with normal typing behavior only. They then attempted to identify the subjects in an unlabeled dataset that contained some samples that were typed with only one hand. This scenario simulates a severe user handicap.

Baseline results indicate a severe degradation in performance for one-handed keystroke samples. Participants had to construct novel classifiers capable of identifying normal and handicapped samples in this competition that ranked the identification accuracy under several different typing conditions.

The winning group was awarded a Futronic FS88 Fingerprint Scanner.

INTRODUCTION

Three online exams were administered to 64 undergraduate students. Keystrokes were collected using a plugin for Moodle that captures key press and release timestamps on the client and sends this information back to the server.

To simulate a typing impairment, students were instructed to• Type normally with both hands on the first exam.• Type with left hand only on the second exam.• Type with right hand only on the third exam.

Samples were created by taking 500-keystroke segments separated by at least 50 keystrokes apart. The labeled dataset consisted of one normally-typed sample per student. The unlabeled dataset contained 471 samples from all three typing conditions. Not all of the students in the labeled dataset also appeared in the unlabeled dataset. All samples were provided in millisecond precision and normalized to begin at time 0 to avoid linking the samples by the time the test was taken.

Competition participants were allowed to make up to one submission per day, using a plugin for Moodle developed by the authors. Results were automatically scored and remain publicly available:

http://biometric-competitions.com/mod/competition/leaderboard.php?id=7

DATA

Accuracy for each typing style

Accuracy for handedness vs. typing condition

COMPETITION RESULTS WINNING STRATEGIES

• Duration features only• Multi-classifier pairwise coupling with 2 regression

models and a prediction model• Artificial Neural Network (ANN)• Counter-Propagation Artificial Neural Network

(CPANN)• Support Vector Machine (SVM)• Weighted fusion of classifier scores

• Features corresponding to the typing condition• Left-side keyboard features for left-hand typing• Right-side keyboard features for right-hand

typing

Third place

• Duration, release-press latency, and trigraph features• trigraph features: press to release of alternate

keystrokes• Fusion of normalized distance between feature vectors

and Least Squares Support Vector Machine (LS-SVM)• Meta-parameters of the LS-SVM determined on

an independent dataset• Weighted fusion of classifier scores based on

individual classifier performanceACKNOWLEDGEMENTS

The authors would like to acknowledge the support from the National Science Foundation under Grant No. 1241585. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or the US government.

John V. Monaco1, Gonzalo Perez1, Charles C. Tappert1, Patrick Bours2, Soumik Mondal2, Sudalai Rajkumar3, Aythami Morales4, Julian Fierrez4, Javier Ortega-Garcia4

1. Pace University, 2. Gjøvik University College, 3. Tiger Analytics, 4. Universidad Autónoma de Madrid

One-handed Keystroke Biometric Identification Competition

Accuracy distribution per sample for each typing condition

Accuracy distribution per student

Accuracy vs. typing speed

First place

Second place

• Duration, press-press latency, and release-press latency features

• Grouped features based on keyboard layout (left vs. right, top vs. bottom)

• Random Forest classifier• Features corresponding to typing condition, similar as

above.

Bottom tree structure for pairwise coupling