K Keystroke based User t k b d U Identification on Smart Phones - - PowerPoint PPT Presentation

k keystroke based user t k b d u identification on smart
SMART_READER_LITE
LIVE PREVIEW

K Keystroke based User t k b d U Identification on Smart Phones - - PowerPoint PPT Presentation

RAID 2009 K Keystroke based User t k b d U Identification on Smart Phones Saira Zahid 1 , Muhammad Shahzad 1 , Syed Ali Khayam 1,2 , , , y y , Muddassar Farooq 1 1 Next Generation Intelligent Networks Research Center 2 School of


slide-1
SLIDE 1

RAID ‐ 2009

K t k b d U Keystroke‐based User Identification on Smart Phones Saira Zahid1, Muhammad Shahzad1, Syed Ali Khayam1,2, , , y y , Muddassar Farooq1

1 Next Generation Intelligent Networks Research Center 2 School of Electrical Engineering & Computer Sciences

g National University of Computer & Emerging Sciences Islamabad, Pakistan http://www.nexginrc.org g g p National University of Sciences & Technology Islamabad, Pakistan http://wisnet.seecs.edu.pk

slide-2
SLIDE 2

How did the paper get accepted??? How did the paper get accepted???

  • Extensive use of the words

–Smart Phones –Model Model

2 of 28

slide-3
SLIDE 3

Motivation behind User Identification on Smart Phones

  • Mobile computing devices combine three extremely

potent concepts

  • computing

p p

  • mobility
  • miniaturization

y

3 of 28

slide-4
SLIDE 4

Motivation (Contd )

SUMMARY FIGURE

M 2009

Motivation (Contd.)

SUMMARY FIGURE PROJECTED GLOBAL SALES FOR SMARPHONES, 2006‐2013 ($ MILLIONS)

  • May 2009

BCC Research group report : “Global Market for Smart

120 140 160

Phones and PDAs” (USD 4850)

– 2008: Smart Phones market generated $58 7 billion

60 80 100 120

generated $58.7 billion – 2013: expected to increase to $153.3 billion

20 40

4 of 28

2006 2007 2008 2013

slide-5
SLIDE 5

Objectives of the user identification system

1. Correct classification 2 Quick User identification 2. Quick User identification 3. Continuous monitoring 4. Resource efficient and light weight solutions solutions

5 of 28

slide-6
SLIDE 6

Existing Methods Existing Methods

6 of 28

slide-7
SLIDE 7

The solution???

K k D i

The solution???

  • Keystroke Dynamics

40 45 40 45

  • 20

25 30 35 40 R (%) 20 25 30 35 40 R (%) 5 10 15 20 FA 5 10 15 20 FR

7 of 28

Unacceptable method. Say goodbye to keystroke dynamics

slide-8
SLIDE 8

The Classification Challenge The Classification Challenge

8 of 28

slide-9
SLIDE 9

The Classification Challenge The Classification Challenge

  • A problem of

A problem of Bio‐inspired classification classification

9 of 28

slide-10
SLIDE 10

A Tri‐Mode System for User Identification

Tri‐Mode Tri Mode System Learning M d Detection M d Verification M d Mode Mode Mode

10 of 28

slide-11
SLIDE 11

11 of 28

slide-12
SLIDE 12

Learning Mode Learning Mode

  • An optimizer fine tunes rule base and

database of a Fuzzy Classifier y

–Genetic Algorithm (GA)

  • Darwinian Evolution
  • Darwinian Evolution

–Particle Swarm Optimization (PSO)

  • Feedback
  • Feedback

– Hybrid of PSO and GA:

  • Feedback controlled Darwinian Evolution

12 of 28

  • Feedback controlled Darwinian Evolution
slide-13
SLIDE 13

Detection Mode Detection Mode

  • Fuzzy classifier trained and ready
  • Continuous user monitoring

Continuous user monitoring

– We don’t know what will the user write

  • Classification is done after e er 250 ke
  • Classification is done after every 250 key

presses

– If the user is legitimate user, the system keeps on monitoring further

13 of 28

– If it raises as alarm, the system goes to verification mode

slide-14
SLIDE 14

Verification Mode

  • Activated when Detection Mode raises

Verification Mode

  • Activated when Detection Mode raises

an alarm

  • PIN based authentication

–match the typing behavior yp g

  • we already know what is coming next

–Very accurate Very accurate

14 of 28

slide-15
SLIDE 15

Verification Mode (The Maths) Verification Mode (The Maths)

15 of 28

slide-16
SLIDE 16

Dataset

  • A Key Logging application for Symbian

Dataset

  • A Key Logging application for Symbian

based Nokia phones

  • 25 users, 7 days

–From diverse backgrounds g –Includes students researchers professors people students, researchers, professors, people from corporate world, senior citizens businessmen engineers etc

16 of 28

citizens, businessmen, engineers etc

slide-17
SLIDE 17

Visual Representation of features p

17 of 28

slide-18
SLIDE 18

d Adjacent Non‐Adjacent Horizontal Digraph Adjacent Vertical Digraph Horizontal Digraph Vertical Digraph Non‐Adjacent Vertical Digraph

slide-19
SLIDE 19

Visual Representation of features p

19 of 28

slide-20
SLIDE 20

Experiments and Results

  • Nature of Classification

p

– PSO‐GA‐Fuzzy scheme: Two class classification – Verification mode: Anomaly detection scheme

  • For training we take 1 user as legitimate and 4

random users as imposters

  • Testing done on remaining 20 users and the

legitimate user

  • The user used as imposter in training is never

presented for testing

20 of 28

slide-21
SLIDE 21

Accuracy Analysis y y

35 40 45 35 40 45 15 20 25 30 FAR (%) 15 20 25 30 FRR (%) 5 10 15 5 10 15

21 of 28

An improvement of 92.9% in FAR and 93.5% in FRR

slide-22
SLIDE 22

Error Rate vs. Number of keys

18 20 u10 u14 u15 14 u10 u14 u15

y

12 14 16 18 10 12 6 8 10 12 6 8 FRR (%) FAR (%) 2 4 6 2 4 150 200 250 300 350 Number of Keypresses 150 200 250 300 350 Number of Keypresses

22 of 28

slide-23
SLIDE 23

Training and Testing times

30 2.5

g g

20 25 e (secs) 1 5 2 e (secs) 10 15 aining Time 1 1.5 esting Time 5 Tra 0.5 Te

23 of 28

slide-24
SLIDE 24

Limitations

  • Identification delay of 250 keystrokes
  • Identification delay of 250 keystrokes
  • Accuracy sensitive to size of training data
  • Not for QWERTY keyboard and Touch

Screen smart phones Screen smart phones

  • Large training time
  • Non‐Resilient to OS reinstallation

24 of 28

slide-25
SLIDE 25

Overview of the Contribution

1 Identification of the problem domain as a bio inspired

  • 1. Identification of the problem domain as a bio‐inspired

classification problem

  • 2. A Keystroke‐based User Identification System for Smart

Phones with 93% improvement

  • 3. Low runtime complexity ‐‐> Real world deployable
  • 4. Dataset: will be released very soon

25 of 28

slide-26
SLIDE 26

Acknowledgement g

  • Information Communication Technology
  • Information Communication Technology

Research and Development Fund (ICTR D F d) Mi i t f IT P ki t (ICTRnD Fund), Ministry of IT, Pakistan

www.ictrdf.org.pk

26 of 28

slide-27
SLIDE 27

Screen shot of a desktop based d i ti d t derivative product

27 of 28

slide-28
SLIDE 28