SlideShare a Scribd company logo
LOREM
I P S U M
LEARNING FROM
BIOMETRICS
To prevent #CyberSecurity 🕵 threats
Valerio Maggio
@leriomaggio Data Scientist & Pythonistas @ FBK
vmaggio@fbk.eu
DOLOR
S I T
A M E T
SORRY, WHO?
• Post Doc Researcher
• Background in CS
• Interested in Machine & Deep Learning
• Core in Biomedicine & Environment
here
We’re looking for students for
Internship & (PhD) Thesis
• Applied Machine Learning (a.k.a. Data Science)
https://mpbalab.fbk.eu
DONEC
F I N I B U
S A C
• Geek & Nerd
• Fellow Pythonista since 2006
this is a better me !-)
SORRY, WHO?
100K points if
you get this pun !-)
github.com/leriomaggio
Learning from Biometric Fingerprints to prevent Cyber Security Threats
Machine
Learning
B
U
Z
Z
W
O
R
D
S
NULLA
C O N G U
E S A P I E
N
WHAT THE CLOUDS SAY
VITAE
A U G U E
C O N S E
C T E T U R
WHAT THE CLOUDS KEEP
SAYING…
AT
CONVALLIS
M I
A U C T O R .
WHAT THE CLOUDS STILL
SAY…
FUSCE
F E U G I A T
WHAT THE CLOUDS
FINALLY SAY!
Learning from Data
for future predictions
ACHINE
LEARNING
LAVOURS
SED
SUSCIPIT
I N
E L I T
M O L L I S
SUPERVISED SETTING
• Input Data are accompanied with
labels the ML model can learn from
• i.o.w. labels are reference for the
model to estimate the expected
outcomes
DIGITS CLASSIFICATION
Labels are
Categories
HOUSE PRICES ESTIMATION
Labels are
Real numbers
FRINGILLA
M A E C E
N A S
G R A V I D
A S
UNSUPERVISED
SETTING
• No label is provided
• Learning directly from data
• e.g. Clustering
CLUSTERING
FUSCE
F E U G I A T
WHAT THE CLOUDS
FINALLY SAY!
EU TURPIS
V O L U P T A
T
Let’s play with
all of this!
Learning from Biometric Fingerprints to prevent Cyber Security Threats
IPSUM
E G E T
A U C T O R APPLIED ML IN 5 STEPS
• Collect the Data
1. Look at the Data & Clean the Data
2. Prepare the data
3. Train your model(s)
4. Predict using your best model using unseen data
(namely: data NOT used in training)
5. Deploy your system in production
Learning from Biometric Fingerprints to prevent Cyber Security Threats
TWO COMMON FRAUDS
Account Hijacking
Card Faking
TWO COMMON FRAUDS
Account Hijacking
User Identification
USER IDENTIFICATION
KEYSTROKE DYNAMICS
Keystroke dynamics consists in analysing the way a user types by monitoring
keyboard inputs thousand of times per second, and processing this data through an
algorithm, which then defines a pattern for future comparison
Identifying an individual based on their way of typing on a physical or virtual keyboard
KEYSTROKE DYNAMICS
Time between two key pressures
Time between one pressure and one release
Time between one release and one pressure
Time between two key release
Intuition:
Users have unique ways to
type on keyboards
(i.e. typing patterns)
KEYSTROKE DYNAMIC
Time between two key pressures
Down-Down Time
Time between one pressure and one release-
Dwell Time
Time between one release and one pressure
Flight Time
Time between two key release
Up-Up Time
LOOKING FOR
ANOMALIES
DATA COLLECTION
Time between two key pressures
Down-Down Time
Time between one pressure and one release-
Dwell Time
Time between one release and one pressure
Flight Time
Time between two key release
Up-Up Time
• Dataset Statistics:
• 50 different users
• 450+ patterns each
DONEC
M E N U S
U R N A
STEP 1: LOOK AT
THE DATA AND
CLEAN THEM
UP-UP TIME - USERNAME FIELD - WEB VS APP
UP-UP TIME - PASSWORD FIELD - WEB VS APP
DWELL TIME - USERNAME FIELD - WEB VS APP
DWELL TIME - PASSWORD FIELD - WEB VS APP
DATA
CLEANING
Complexity-Invariant
Distance Measure
FEATURE SCALING (NORMALISATION)
Original
Feature Data
MinMax Scaling
Standard Scaling
PULVINAR
V I T A E
E L I T .
STEP 2:PREPARE
THE DATA
TRAIN-TEST CUT
WHAT
WE
DO
WHAT
WE
REALLY
DO K-Fold Cross Validation
VIVAMUS
F I N I B
U S
R I S U S
STEP 3-4:TRAIN
AND TEST ML
MODEL
Deep AutoEncoder
Encoder Decoder
…
Classification Deep Network
One AutoEncoder + FC Network
Outlier Detector (per user)
DEEPKS
Deep AutoEncoder
Encoder Decoder
DEEPKS
1. AUTOENCODER
Trained on genuine keystroke patterns
Unsupervised Machine (Deep) Learning
Deep AutoEncoder
Encoder Decoder
DEEPKS
2. DISCRIMINATOR
Trained on genuine &
adversarial patterns
EVALUATION METRICS
Confusion Matrix
over ~5200 samples
SAMPLE
SIZE TEST
Q: How many patterns would I
need to be confident about the
accuracy of the model ?
Feature Importance
rf.fit(X,y_DL)
NON
DIAM
B L A N D
I T
F E R M E
N T U M .
STEP 5:DEPLOY
YOUR SOLUTION
Models
Database
Model
Service
Feature
Database
Data
Collector
Feature Detection
Orchestration
Model
Training
Service
Feature
Extraction
Alarms
Dashboard
Models Models
Features
+ Labels
Features
Features
Raw Data
Alarm
Prediction
Request
Labels
1
2
3
9
SOC
Alarms
Database
4
5 6
7
Score
Confirmation/
Rejection
Features
8
10
11
12
API Engine
Feature
extractor
DL Model
{json}
Raw data, features,
predictions
SHAMELESS
PLUG
pydata.it
pycon.it
EUROSCIPY 2018
Fondazione Bruno Kessler | Associazione Python Italia
University of Trento
Northern Italy | Trentino Region Tentative dates:
Aug. 28 - Sept. 01 2018
Be posted on euroscipy.org
trento.python.it
Next Meetup: Feb, 22 2018 - h19:00 ➡ @Clab
SHAMELESS
SELF
PROMOTION
https://github.com/leriomaggio/deep-learning-keras-tensorflow
THANK YOU!
🍻
Now it’s time for Cheers
🥓
@leriomaggio
vmaggio@fbk.eu

More Related Content

PDF
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
PDF
A DevOps Tutorial to Set-up Intelligent Machine Learning Driven Alerts
PPTX
machine learning workflow with data input.pptx
PPTX
Building High Available and Scalable Machine Learning Applications
PDF
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
PPTX
230208 MLOps Getting from Good to Great.pptx
PPTX
rsec2a-2016-jheaton-morning
Defcon 21-pinto-defending-networks-machine-learning by pseudor00t
A DevOps Tutorial to Set-up Intelligent Machine Learning Driven Alerts
machine learning workflow with data input.pptx
Building High Available and Scalable Machine Learning Applications
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
AI & ML in Cyber Security - Why Algorithms Are Dangerous
230208 MLOps Getting from Good to Great.pptx
rsec2a-2016-jheaton-morning

Similar to Learning from Biometric Fingerprints to prevent Cyber Security Threats (20)

PDF
The Machine Learning Workflow with Azure
PPTX
Borys Rybak “Azure Machine Learning Studio & Azure Workbench & R + Python”
PDF
Machine learning at b.e.s.t. summer university
PPTX
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
PPTX
01_Machine Learning.pptx and made by students
PPTX
Machine learning techniques in fraud prevention
PDF
Choosing a Machine Learning technique to solve your need
PPTX
2024-02-24_Session 1 - PMLE_UPDATED.pptx
PDF
Machine Learning with Big Data using Apache Spark
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PPTX
seminar.pptx
PPTX
AI_06_Machine Learning.pptx
PPTX
Application of Machine Learning in Cybersecurity
PPTX
Artificial Intelligence, Machine Learning and Deep Learning
PPTX
Big Data & Machine Learning - TDC2013 Sao Paulo
PDF
An introduction to Machine Learning
PDF
Практическое применение машинного обучения в ИБ
PPTX
Introduction to ML (Machine Learning)
PDF
Protecting the Protector, Hardening Machine Learning Defenses Against Adversa...
PDF
Machine Learning: What Assurance Professionals Need to Know
The Machine Learning Workflow with Azure
Borys Rybak “Azure Machine Learning Studio & Azure Workbench & R + Python”
Machine learning at b.e.s.t. summer university
Big Data & Machine Learning - TDC2013 São Paulo - 12/0713
01_Machine Learning.pptx and made by students
Machine learning techniques in fraud prevention
Choosing a Machine Learning technique to solve your need
2024-02-24_Session 1 - PMLE_UPDATED.pptx
Machine Learning with Big Data using Apache Spark
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
seminar.pptx
AI_06_Machine Learning.pptx
Application of Machine Learning in Cybersecurity
Artificial Intelligence, Machine Learning and Deep Learning
Big Data & Machine Learning - TDC2013 Sao Paulo
An introduction to Machine Learning
Практическое применение машинного обучения в ИБ
Introduction to ML (Machine Learning)
Protecting the Protector, Hardening Machine Learning Defenses Against Adversa...
Machine Learning: What Assurance Professionals Need to Know
Ad

More from Speck&Tech (20)

PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
PDF
Persuasive AI: risks and opportunities in the age of digital debate
PDF
Fai da te ed elettricità, con la bobina di Tesla!
PDF
DIY ed elettronica ai tempi dell’università
PDF
Sotto il letto, sopra il cloud: costruirsi un’infrastruttura da zero
PDF
Verze e diamanti: oltre le nanotecnologie
PDF
Respira, sei in Trentino! Monitorare l'invisibile
PDF
Cognitive Robotics: from Babies to Robots and AI
PDF
Edge AI: Bringing Intelligence to Embedded Devices
PDF
Genere e gioco da tavolo: il caso di "Free to Choose"
PDF
SPaRKLE: un rivelatore compatto di radiazioni spaziali, realizzato dagli stud...
PDF
Il ruolo degli stati alterati di coscienza e degli psichedelici nella terapia
PDF
Unity3D: Things you need to know to get started
PDF
How do we program a God? - Do the Androids dream of the electric sheep?
PDF
The bad, the ugly and the weird about IoT
PDF
Arduino is Hardware, Software, IoT and Community
PDF
Computational privacy: balancing privacy and utility in the digital era
PDF
Il trucco c'è (e si vede) - Beatrice Mautino
PDF
ScrapeGraphAI: AI-powered web scraping, reso facile con l'open source
PDF
Dietro le quinte del sapere libero: Wikipedia e OpenStreetMap, i nostri beni ...
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Persuasive AI: risks and opportunities in the age of digital debate
Fai da te ed elettricità, con la bobina di Tesla!
DIY ed elettronica ai tempi dell’università
Sotto il letto, sopra il cloud: costruirsi un’infrastruttura da zero
Verze e diamanti: oltre le nanotecnologie
Respira, sei in Trentino! Monitorare l'invisibile
Cognitive Robotics: from Babies to Robots and AI
Edge AI: Bringing Intelligence to Embedded Devices
Genere e gioco da tavolo: il caso di "Free to Choose"
SPaRKLE: un rivelatore compatto di radiazioni spaziali, realizzato dagli stud...
Il ruolo degli stati alterati di coscienza e degli psichedelici nella terapia
Unity3D: Things you need to know to get started
How do we program a God? - Do the Androids dream of the electric sheep?
The bad, the ugly and the weird about IoT
Arduino is Hardware, Software, IoT and Community
Computational privacy: balancing privacy and utility in the digital era
Il trucco c'è (e si vede) - Beatrice Mautino
ScrapeGraphAI: AI-powered web scraping, reso facile con l'open source
Dietro le quinte del sapere libero: Wikipedia e OpenStreetMap, i nostri beni ...
Ad

Recently uploaded (20)

PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hybrid model detection and classification of lung cancer
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPT
What is a Computer? Input Devices /output devices
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Getting Started with Data Integration: FME Form 101
Univ-Connecticut-ChatGPT-Presentaion.pdf
cloud_computing_Infrastucture_as_cloud_p
Hybrid model detection and classification of lung cancer
Final SEM Unit 1 for mit wpu at pune .pptx
Group 1 Presentation -Planning and Decision Making .pptx
Tartificialntelligence_presentation.pptx
Developing a website for English-speaking practice to English as a foreign la...
Programs and apps: productivity, graphics, security and other tools
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Getting started with AI Agents and Multi-Agent Systems
Assigned Numbers - 2025 - Bluetooth® Document
A novel scalable deep ensemble learning framework for big data classification...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
What is a Computer? Input Devices /output devices
OMC Textile Division Presentation 2021.pptx
Hindi spoken digit analysis for native and non-native speakers

Learning from Biometric Fingerprints to prevent Cyber Security Threats