Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud

被引:28
|
作者
Al-Rubaie, Mohammad [1 ]
Chang, J. Morris [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
Mobile devices; continuous authentication; gestures; privacy; reconstruction attacks; machine learning; IMAGE;
D O I
10.1109/TIFS.2016.2594132
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Continuous authentication for mobile devices using behavioral biometrics is being suggested to complement initial authentication for securing mobile devices, and the cloud services accessed through them. This area has been studied over the past few years, and low error rates were achieved; however, it was based on training and testing using support vector machine (SVM) and other non-privacy-preserving machine learning algorithms. To stress the importance of carefully designed privacy-preserving systems, we investigate the possibility of reconstructing gestures raw data from users' authentication profiles or synthesized samples' testing results. We propose two types of reconstruction attacks based on whether actual user samples are available to the adversary (as in SVM profiles) or not. We also propose two algorithms to reconstruct raw data: a numerical-based algorithm that is specific to one compromised system, and a randomization-based algorithm that can work against almost any compromised system. For our experiments, we selected one compromised and four attacked gesture-based continuous authentication systems from the recent literature. The experiments, performed using a public data set, showed that the attacks were feasible, with a median ranging from 80% to 100% against one attacked system using all types of attacks and algorithms, and a median ranging from 73% to 100% against all attacked systems using the randomization-based algorithm and the negative support vector attack. Finally, we analyze the results, and provide recommendations for building active authentication systems that could resist reconstruction attacks.
引用
收藏
页码:2648 / 2663
页数:16
相关论文
共 50 条
  • [1] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    [J]. PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [2] A novel model for securing mobile-based systems against DDoS attacks in cloud computing environment
    El-Sofany, Hosam F.
    El-Seoud, Samir A.
    [J]. International Journal of Interactive Mobile Technologies, 2019, 13 (01) : 85 - 98
  • [3] Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication
    Abdelrahman, Yomna
    Khamis, Mohamed
    Schneegass, Stefan
    Alt, Florian
    [J]. PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 3751 - 3763
  • [4] Few-Shot Continuous Authentication for Mobile-Based Biometrics
    Wagata, Kensuke
    Teoh, Andrew Beng Jin
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [5] Continuous Authentication against Collusion Attacks
    Lyu, Pin
    Cai, Wandong
    Wang, Yao
    [J]. SENSORS, 2022, 22 (13)
  • [6] Enhancing eID card mobile-based authentication through 3D facial reconstruction
    Ruiu, Pietro
    Lagorio, Andrea
    Cadoni, Marinella
    Grosso, Enrico
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [7] Combating online fraud attacks in mobile-based advertising
    Cho G.
    Cho J.
    Song Y.
    Choi D.
    Kim H.
    [J]. EURASIP Journal on Information Security, 2016 (1): : 1 - 9
  • [8] On the transferability of adversarial perturbation attacks against fingerprint based authentication systems
    Marrone, Stefano
    Sansone, Carlo
    [J]. PATTERN RECOGNITION LETTERS, 2021, 152 : 253 - 259
  • [9] A Secure Mobile-Based Authentication System for e-Banking
    Rifa-Pous, Helena
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 2, 2009, 5871 : 848 - 860
  • [10] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    [J]. 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329