Gametrics: Towards Attack-Resilient Behavioral Authentication with Simple Cognitive Games

被引:4
|
作者
Mohamed, Manar [1 ]
Saxena, Nitesh [1 ]
机构
[1] Univ Alabama Birmingham, Birmingham, AL 35294 USA
关键词
D O I
10.1145/2991079.2991096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticating a user based on her unique behavioral biometric traits has been extensively researched over the past few years. The most researched behavioral biometrics techniques are based on keystroke and mouse dynamics. These schemes, however, have been shown to be vulnerable to human-based and robotic attacks that attempt to mimic the user's behavioral pattern to impersonate the user. In this paper, we aim to verify the user's identity through the use of active, cognition-based user interaction in the authentication process. Such interaction boasts to provide two key advantages. First, it may enhance the security of the authentication process as multiple rounds of active interaction would serve as a mechanism to prevent against several types of attacks, including zero effort attack, expert trained attackers, and automated attacks. Second, it may enhance the usability of the authentication process by actively engaging the user in the process. We explore the cognitive authentication paradigm through very simplistic interactive challenges, called Dynamic Cognitive Comes, which involve objects floating around within the images, where the user's task is to match the objects with their respective target(s) and drag/drop them to the target location(s). Specifically, we introduce, build and study Gametrics ("Game-based biometrics"), an authentication mechanism based on the unique way the user solves such simple challenges captured by multiple features related to her cognitive abilities and mouse dynamics. Based on a comprehensive data set collected in both online and lab settings, we show that Gametrics can identify the users with a high accuracy (false negative rates, FAR, as low as 0.02) while rejecting zero-effort attackers (false positive rates, EPR, as low as 0.02). Moreover, Gametrics shows promising results in defending against expert attackers that try to learn and later mimic the user's pattern of solving the challenges (FPR for expert human attacker as low as 0.03). Furthermore, we argue that the proposed biometrics is hard to be replayed or spoofed by automated means, such as robots or malware attacks.
引用
收藏
页码:277 / 288
页数:12
相关论文
共 13 条
  • [1] Towards Attack-Resilient Geometric Data Perturbation
    Chen, Keke
    Sun, Gordon
    Liu, Ling
    [J]. PROCEEDINGS OF THE SEVENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 78 - +
  • [2] An Attack-Resilient Source Authentication Protocol in Controller Area Network
    Kang, Ki-Dong
    Baek, Youngmi
    Lee, Seonghun
    Son, Sang Hyuk
    [J]. 2017 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2017, : 109 - 118
  • [3] Attack-Resilient Path Planning Using Dynamic Games With Stopping States
    Banik, Sandeep
    Bopardikar, Shaunak D.
    [J]. IEEE TRANSACTIONS ON ROBOTICS, 2022, 38 (01) : 25 - 41
  • [4] Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services
    Chakraborty, Nilesh
    Anand, Vijay S.
    Mondal, Samrat
    [J]. COMPUTERS & SECURITY, 2019, 84 : 193 - 205
  • [5] Towards Attack-Resilient Communications for Smart Grids with Software-Defined Networking
    Wu, Yifu
    Wei, Jin
    [J]. 2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
  • [6] Fully distributed attack-resilient Nash equilibrium seeking for networked games subject to DoS attacks
    Qian, Cheng
    Ding, Lei
    [J]. INFORMATION SCIENCES, 2023, 641
  • [7] A Novel Single-Time Scale Distributed Attack-Resilient Algorithm for Multi-Cluster Games
    Li, Fan
    Liu, Dongxin
    Nian, Xiaohong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 4252 - 4263
  • [8] Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability
    Ren, Kui
    Lou, Wenjing
    [J]. MOBILE NETWORKS & APPLICATIONS, 2007, 12 (01): : 79 - 92
  • [9] Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability
    Kui Ren
    Wenjing Lou
    [J]. Mobile Networks and Applications, 2007, 12 : 79 - 92
  • [10] Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID
    Liu, Jianwei
    Zou, Xiang
    Lin, Feng
    Han, Jinsong
    Xu, Xian
    Ren, Kui
    [J]. 2021 IEEE 41ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2021), 2021, : 1042 - 1052