Behavior-based Authentication Systems - PowerPoint PPT Presentation

1 / 46
About This Presentation
Title:

Behavior-based Authentication Systems

Description:

Behavior-based Authentication Systems Multimedia Security Part 1: User Authentication Through Typing Biometrics Features Part 2: User Re-Authentication via Mouse ... – PowerPoint PPT presentation

Number of Views:117
Avg rating:3.0/5.0
Slides: 47
Provided by: peiz
Category:

less

Transcript and Presenter's Notes

Title: Behavior-based Authentication Systems


1
Behavior-based Authentication Systems
  • Multimedia Security

2
  • Part 1
  • User Authentication Through Typing Biometrics
    Features
  • Part 2
  • User Re-Authentication via Mouse Movements

3
User Authentication Through Typing Biometrics
Features
  • Lívia C. F. Araújo, Luiz H. R. Sucupira Jr.,
    Miguel G. Lizárrage, Lee L. Ling, and João B. T.
    Yabu-Uti, Correspondence, IEEE Transactions on
    Signal Processing, vol. 53, no. 2, Feb. 2005,

4
Introduction
  • The login-password authentication is the most
    usual mechanism used to grant access.
  • low-cost
  • familiar to a lot of users
  • however, fragile (careless user / weak password)
  • The paper provides better approach to improve
    above one using biometric characteristics.
  • unique
  • cannot be stolen, lost, forgotten

5
Introduction (cont.)
  • The technology used is typing biometric,
    keystroke dynamics.
  • monitoring the keyboard inputs to identify users
    based on their habitual typing rhythm pattern
  • The method's advantages
  • low-cost (using keyboard)
  • unintrusive (using a password)
  • using a static approach (using the login session)

6
Some Keywords
  • Target String
  • The input string typed by the user and monitored
    by system
  • String length is important issue. (at least ten
    characters)
  • Number of Samples
  • Samples collected during the enrollment process
    to compound the training set
  • Its number varies a lot.
  • Features
  • key duration (the time interval that a key
    remains pressed)
  • keystroke latency (the time interval between
    successive keystrokes)

7
Some Keywords (cont.)
  • Timing Accuracy
  • The precision of the key-up and key-down times
    have to be analyzed.
  • It varies between 0.1ms ad 1000ms.
  • Trials of Authentication
  • The legitimate users usually fail in the first of
    authentication.
  • If the user still fail in the second time, he
    will be considered an impostor.
  • Adaptation Mechanism
  • Biometric characteristics changes over time. The
    system need updated.
  • Classifier
  • k-means, Bayes, fuzzy logic, neural networks, etc.

8
The Approach Proposed
  • Get target string with at least ten characters.
  • Get ten samples. (more than ten samples may annoy
    the users)
  • Analysis features (The combination of these
    features is novel in this paper.)
  • key code
  • two keystrokes latencies
  • key duration
  • 1-ms time accuracy is used.
  • An adaptation mechanism is used to update
    template.

9
Flowchart of the Methodology
10
Main Issue
  • Timing Accuracy
  • Keystroke Data
  • Features
  • Template
  • Classifier
  • Adaptation Mechanism

11
Timing Accuracy
  • Since 98 of the samples' value are between 10
    and 900ms, 1-ms precision is used.

12
Keystroke Data
  • m characters, n keystrokes (m ? n)
  • sample w, account a
  • Each is composed of

13
Features
  • key code
  • down-down (DD)
  • up-down (UD) (This feature may be pos. or neg.)
  • down-up (DU) (key interval)

14
Features (cont.)
The distance will be discussed later.
15
Template (constructed by ten samples)
16
Classifier
  • If , the sample is considered
    false.
  • Otherwise, for each time feature, calculate the
    distance between template and samples.

17
Classifier (cont.)
  • The sample will be considered true if
  • A users feature with a lower variance demands a
    higher threshold and vice versa.

18
Adaptation Mechanism
  • If , add
    this sample into template and discard the oldest
    one.
  • The standard deviation for each feature is
    modified and the threshold are modified.

19
Experiements
  • 30 users (men and women between 20 and 60 years
    old)
  • Three situation
  • Legitimate user authentication
  • Imposter user authentication
  • Observer imposter user authentication
  • Seven experiments
  • 1) only DD 2) only UD 3) only DU4) DD and UD
    5) DD and DU 6) UD and DU7) DD, UD, and DU

20
Result
  • False Acceptance Rate (FAR)
  • False Rejection Rate (FRR)
  • Zero FAR
  • Zero FRR
  • Equal Error Rate (EER)

21
  • Only DD time
  • Only UD time
  • Only DU time
  • DD and UD times
  • DD and DU times
  • UD and DU times
  • DD, UD, and DU times.

22
(No Transcript)
23
Discussion
  • A target string with capital letters increases
    the difficulty of authentication.
  • The familiarity of the target string to the user
    has a significant impact. (FRR 17.26)
  • One-trial authentication significantly increase
    the FRR. (FRR 11.57)
  • The adaptation mechanism decreases both rate.
    (FAR 4.70 FRR 4.16)

24
Discussion (cont.)
  • If the adaptation mechanism is always activated,
    the FAR increase a lot. (FAR 9.4 FRR 3.8)
  • A higher timing accuracy decreases both rate.
    (FRR 1.63 FAR 3.97)
  • FRR increases as the number of samples is
    reduced.

25
(No Transcript)
26
(No Transcript)
27
Conclusion
  • The method applied uses just one target string
    and ten samples in enrollment. The best
    performance was achieved using a statistical
    classifier base on distance and the combination
    of four feature (key code, DD, UD, DU times)
    which is novel, obtaining a 1.45 FRR and 1.89
    FAR.
  • This paper shows the influence of some aspects,
    such as the familiarity of the target string, the
    two-trial authentication, the adaptation
    mechanism, the time accuracy, the number of
    samples in enrollment.

28
User Re-Authentication via Mouse Movements
  • Maja Pusara and Caria E.Brodley,
  • Proceedings of the 2004 ACM workshop on
    Visualization and data mining for computer
    security

29
Outline
  • Introduction
  • User Re-Authentication via Mouse Movements
  • An Empirical Evaluation
  • Future work

30
Introduction(1/3)
  • Why re-authentication?
  • The purpose of a re-authentication system is to
    continually monitor the users behavior during
    the session to flag anomalous behavior
  • Defend insider attacks
  • Ex. Forget to logout, forget to lock
  • Ex. Employees, temporary workers, consultants.

31
Introduction(2/3)
  • Traditional re-authentication
  • Periodically ask the user to authentication via
    passwords, tokens, .
  • Behavioral re-authentication
  • Direct keystroke, mouse, .
  • Indirect system call trace, program execution
    traces, .

32
Introduction(3/3)
  • This paper
  • Collect data form 18 users all working with
    Internet Explorer and browse the fixed webpages
    with fixed mouse device.

33
User Re-Authentication via Mouse Movements
  • Roughly
  • Data Collection and Feature Extraction
  • Building a Model of Normal Behavior
  • Anomaly Detection

34
User Re-Authentication via Mouse Movements Data
Collection and Feature Extraction(1/4)
  • The cursor movement
  • Examine whether the mouse has moved every
    100msec.
  • Record distance, angle, and speed.
  • Extract mean, standard deviation, and the third
    moment values over a window of N data points.

35
User Re-Authentication via Mouse Movements Data
Collection and Feature Extraction(2/4)
  • The mouse event
  • NC area the area of the menu and toolbar

36
User Re-Authentication via Mouse Movements Data
Collection and Feature Extraction(3/4)
  • The mouse event
  • Record time of the event.
  • Record distance, angle, and speed between pairs
    of data point A and B, where B occurs after A.
    Calculate the value every f (frequency) data
    points.
  • Extract mean, standard deviation, and the third
    moment values over a window of N data points

37
User Re-Authentication via Mouse Movements Data
Collection and Feature Extraction(4/4)
  • Summary of feature extraction
  • The of observed events in the window.
  • (6) - events.
  • The mean, standard deviation, and the third
    moment of the distance, angle, and speed between
    pairs of points.
  • ( 3 3 (61) ) - cursor events.
  • The mean, standard deviation, and the third
    moment of the X and Y coordinates.
  • ( 3 2 (61) ) - cursor events.

38
User Re-Authentication via Mouse
MovementsBuilding a Model of Normal Behavior(1/1)
  • Using supervised learning algorithm
  • Specify the window size N
  • Specify frequency for every categories

39
User Re-Authentication via Mouse
MovementsAnomaly Detection(1/1)
  • Simple method
  • Trigger an alarm each time a data point in the
    profile is classified as anomalous
  • Smooth filter
  • Require t alarms to occur in m observations of
    the current users behavior profile.
  • If it is anomalous
  • asks the user to authenticate again or reports
    the anomaly to a system administrator.

40
An Empirical Evaluation(1/6)
  • The goal of our experiments is to
  • determine whether a user x when running an
    application (e.g., Internet Explorer) can be
    distinguished from the other n-1 users running
    the same application.

41
An Empirical Evaluation(2/6)
  • 2/4 for training, 1/4 for parameter selection,
    1/4 for testing.
  • Data Sources
  • 18 students
  • 10000 unique cursor locations
  • The same set of web pages
  • Windows Internet Explorer
  • Parameter selection
  • Frequency 1,5,10,15,20
  • Window size 100,200,400,600,800,1000
  • Smoothing filter m 1,3,5,7,9,11

42
An Empirical Evaluation(3/6)
  • Decision Tree Classifier

43
An Empirical Evaluation(4/6)
  • Pair-Wise Discrimination
  • Distinguish two people
  • 6 and 18 with too few mouse movements

44
An Empirical Evaluation(5/6)
  • Anomaly Detection
  • False positive rate authorized user -gt intruder
  • False negative rate intruder -gt authorized user
  • A high false positive rate means too few mouse
    events

45
An Empirical Evaluation(6/6)
  • Smoothing Filter

46
Future work
  • Research the impact of replay attacks
  • How best to apply unsupervised learning
  • How to incorporate the results from different
    sources. (ex keystroke , mouse)
Write a Comment
User Comments (0)
About PowerShow.com