46
Behavior-based Authentication Systems Multimedia Security

Behavior-based Authentication Systems Multimedia Security

Embed Size (px)

Citation preview

Page 1: Behavior-based Authentication Systems Multimedia Security

Behavior-based Authentication Systems

Multimedia Security

Page 2: Behavior-based Authentication Systems Multimedia Security

2

Part 1:• User Authentication Through Typing

Biometrics Features

Part 2:• User Re-Authentication via Mouse

Movements

Page 3: Behavior-based Authentication Systems Multimedia Security

User Authentication Through Typing Biometrics Features

Lívia C. F. Araújo, Luiz H. R. Sucupira Jr., Miguel G. Lizárrage, Lee L. Ling, and João B. T. Yabu-Uti,

Correspondence, IEEE Transactions on Signal Processing, vol. 53, no. 2, Feb. 2005,

Page 4: Behavior-based Authentication Systems Multimedia Security

4

Introduction

• The login-password authentication is the most usual mechanism used to grant access.– low-cost– familiar to a lot of users– however, fragile (careless user / weak

password)• The paper provides better approach to improve

above one using biometric characteristics.– unique– cannot be stolen, lost, forgotten

Page 5: Behavior-based Authentication Systems Multimedia Security

5

Introduction (cont.)

• The technology used is typing biometric, keystroke dynamics.– monitoring the keyboard inputs to identify

users based on their habitual typing rhythm pattern

• The method's advantages– low-cost (using keyboard)– unintrusive (using a password)– using a static approach (using the login

session)

Page 6: Behavior-based Authentication Systems Multimedia Security

6

Some Keywords

• Target String– The input string typed by the user and monitored by

system– String length is important issue. (at least ten characters)

• Number of Samples– Samples collected during the enrollment process to

compound the training set– Its number varies a lot.

• Features– key duration (the time interval that a key remains

pressed)– keystroke latency (the time interval between successive

keystrokes)

Page 7: Behavior-based Authentication Systems Multimedia Security

7

Some Keywords (cont.)

• Timing Accuracy– The precision of the key-up and key-down times have to be

analyzed.– It varies between 0.1ms ad 1000ms.

• Trials of Authentication– The legitimate users usually fail in the first of authentication.– If the user still fail in the second time, he will be considered an

impostor.

• Adaptation Mechanism– Biometric characteristics changes over time. The system need

updated.

• Classifier– k-means, Bayes, fuzzy logic, neural networks, etc.

Page 8: Behavior-based Authentication Systems Multimedia Security

8

The Approach Proposed

• Get target string with at least ten characters.• Get ten samples. (more than ten samples may

annoy the users)• Analysis features: (The combination of these

features is novel in this paper.)– key code– two keystrokes latencies– key duration

• 1-ms time accuracy is used.• An adaptation mechanism is used to update

template.

Page 9: Behavior-based Authentication Systems Multimedia Security

9

Flowchart of the Methodology

Page 10: Behavior-based Authentication Systems Multimedia Security

10

Main Issue

• Timing Accuracy

• Keystroke Data

• Features

• Template

• Classifier

• Adaptation Mechanism

Page 11: Behavior-based Authentication Systems Multimedia Security

11

Timing Accuracy

• Since 98% of the samples' value are between 10 and 900ms, 1-ms precision is used.

Page 12: Behavior-based Authentication Systems Multimedia Security

12

Keystroke Data

• m characters, n keystrokes (m n) ≦• sample w, account a

• Each is composed of

)},( , ... ),,( ),,({ 21, wakwakwakK nwa

),( waki

),( , ),( , ),( wacwatwat iupidowni

Page 13: Behavior-based Authentication Systems Multimedia Security

13

Features

• key code• down-down (DD)

• up-down (UD) (This feature may be pos. or neg.)

• down-up (DU) (key interval)

)},(),...,,(),,({ 21, wacwacwacC nwa

),(),(),(

)},(),...,,(),,({

1

121,

watwatwadd

waddwaddwaddDD

downidownii

nwa

),(),(),(

)},(),...,,(),,({

1

121,

watwatwaud

waudwaudwaudUD

upidownii

nwa

),(),(),(

)},(),...,,(),,({ 21,

watwatwadu

waduwaduwaduDU

downiupii

nwa

Page 14: Behavior-based Authentication Systems Multimedia Security

14

Features (cont.)

The distance will be discussed later.

Page 15: Behavior-based Authentication Systems Multimedia Security

15

Template (constructed by ten samples)

) ,,( :

),(110

1

),(10

1

10

1)()(

10

1)(

UDorDUDDfeatFeature

jafeat

jafeat

jafeatiafeat

jiafeat

ii

i

Page 16: Behavior-based Authentication Systems Multimedia Security

16

Classifier

• If , the sample is considered false.

• Otherwise, for each time feature, calculate the distance between template and samples.

awa CC ,

)(

)(

1

),(),(

),(1

),(

afeat

afeatii

n

iifeat

i

iwafeat

wad

wadn

waD

Page 17: Behavior-based Authentication Systems Multimedia Security

17

Classifier (cont.)

• The sample will be considered true if

• A user’s feature with a lower variance demands a higher threshold and vice versa.

)(),(

)(),(

)(),(

aTwaD

aTwaD

aTwaD

udud

dudu

dddd

Page 18: Behavior-based Authentication Systems Multimedia Security

18

Adaptation Mechanism

• If , add this sample into template and discard the oldest one.

• The standard deviation for each feature is modified and the threshold are modified.

)(),( afeatwafeat Tdi

Page 19: Behavior-based Authentication Systems Multimedia Security

19

Experiements

• 30 users (men and women between 20 and 60 years old)

• Three situation– Legitimate user authentication– Imposter user authentication– Observer imposter user authentication

• Seven experiments– 1) only DD; 2) only UD; 3) only DU;

4) DD and UD; 5) DD and DU; 6) UD and DU;7) DD, UD, and DU

Page 20: Behavior-based Authentication Systems Multimedia Security

20

Result

• False Acceptance Rate (FAR)

• False Rejection Rate (FRR)

• Zero FAR

• Zero FRR

• Equal Error Rate (EER)

Page 21: Behavior-based Authentication Systems Multimedia Security

21

1) Only DD time;2) Only UD time;3) Only DU time;4) DD and UD times;5) DD and DU times;6) UD and DU times;7) DD, UD, and DU times.

Page 22: Behavior-based Authentication Systems Multimedia Security

22

Page 23: Behavior-based Authentication Systems Multimedia Security

23

Discussion

• A target string with capital letters increases the difficulty of authentication.

• The familiarity of the target string to the user has a significant impact. (FRR 17.26%)

• One-trial authentication significantly increase the FRR. (FRR 11.57%)

• The adaptation mechanism decreases both rate. (FAR 4.70% FRR 4.16%)

Page 24: Behavior-based Authentication Systems Multimedia Security

24

Discussion (cont.)

• If the adaptation mechanism is always activated, the FAR increase a lot. (FAR 9.4% FRR 3.8%)

• A higher timing accuracy decreases both rate. (FRR 1.63% FAR 3.97)

• FRR increases as the number of samples is reduced.

Page 25: Behavior-based Authentication Systems Multimedia Security

25

Page 26: Behavior-based Authentication Systems Multimedia Security

26

Page 27: Behavior-based Authentication Systems Multimedia Security

27

Conclusion

• The method applied uses just one target string and ten samples in enrollment. The best performance was achieved using a statistical classifier base on distance and the combination of four feature (key code, DD, UD, DU times) which is novel, obtaining a 1.45% FRR and 1.89% FAR.

• This paper shows the influence of some aspects, such as the familiarity of the target string, the two-trial authentication, the adaptation mechanism, the time accuracy, the number of samples in enrollment.

Page 28: Behavior-based Authentication Systems Multimedia Security

User Re-Authentication via Mouse Movements

Maja Pusara and Caria E.Brodley,

Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security

Page 29: Behavior-based Authentication Systems Multimedia Security

29

Outline

• Introduction

• User Re-Authentication via Mouse Movements

• An Empirical Evaluation

• Future work

Page 30: Behavior-based Authentication Systems Multimedia Security

30

Introduction(1/3)

• Why re-authentication?– The purpose of a re-authentication system is

to continually monitor the user’s behavior during the session to flag “anomalous” behavior

– Defend “insider attacks”• Ex. Forget to logout, forget to lock…• Ex. Employees, temporary workers, consultants.

Page 31: Behavior-based Authentication Systems Multimedia Security

31

Introduction(2/3)

• Traditional re-authentication– Periodically ask the user to authentication via

passwords, tokens, … .

• Behavioral re-authentication– Direct: keystroke, mouse, … .– Indirect: system call trace, program execution

traces, … .

Page 32: Behavior-based Authentication Systems Multimedia Security

32

Introduction(3/3)

• This paper…– Collect data form 18 users all working with Int

ernet Explorer and browse the fixed webpages with fixed mouse device.

Page 33: Behavior-based Authentication Systems Multimedia Security

33

User Re-Authentication via Mouse Movements

• Roughly– Data Collection and Feature Extraction– Building a Model of Normal Behavior– Anomaly Detection

Page 34: Behavior-based Authentication Systems Multimedia Security

34

User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(1/4)

• The cursor movement– Examine whether the mouse has moved

every 100msec.– Record distance, angle, and speed.– Extract mean, standard deviation, and the

third moment values over a window of N data points.

Page 35: Behavior-based Authentication Systems Multimedia Security

35

User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(2/4)

The mouse event

• NC area: the area of the menu and toolbar

Page 36: Behavior-based Authentication Systems Multimedia Security

36

User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(3/4)

• The mouse event– Record time of the event.– Record distance, angle, and speed between

pairs of data point A and B, where B occurs after A. Calculate the value every f (frequency) data points.

– Extract mean, standard deviation, and the third moment values over a window of N data points

Page 37: Behavior-based Authentication Systems Multimedia Security

37

User Re-Authentication via Mouse Movements Data Collection and Feature Extraction(4/4)

• Summary of feature extraction– The # of observed events in the window.

• (6) - events.

– The mean, standard deviation, and the third moment of the distance, angle, and speed between pairs of points.

• ( 3 * 3 * (6+1) ) - cursor & events.

– The mean, standard deviation, and the third moment of the X and Y coordinates.

• ( 3 * 2 * (6+1) ) - cursor & events.

Page 38: Behavior-based Authentication Systems Multimedia Security

38

User Re-Authentication via Mouse MovementsBuilding a Model of Normal Behavior(1/1)

• Using supervised learning algorithm

• Specify the window size N

• Specify frequency for every categories

Page 39: Behavior-based Authentication Systems Multimedia Security

39

User Re-Authentication via Mouse MovementsAnomaly Detection(1/1)

• Simple method– Trigger an alarm each time a data point in the

profile is classified as anomalous

• Smooth filter– Require t alarms to occur in m observations of

the current user’s behavior profile.

• If it is anomalous : – asks the user to authenticate again or reports

the anomaly to a system administrator.

Page 40: Behavior-based Authentication Systems Multimedia Security

40

An Empirical Evaluation(1/6)

• The goal of our experiments is to– determine whether a user x when running an

application (e.g., Internet Explorer) can be distinguished from the other n-1 users running the same application.

Page 41: Behavior-based Authentication Systems Multimedia Security

41

An Empirical Evaluation(2/6)

• 2/4 for training, 1/4 for parameter selection, 1/4 for testing.

• Data Sources– 18 students– 10000 unique cursor locations– The same set of web pages– Windows Internet Explorer

• Parameter selection– Frequency: 1,5,10,15,20– Window size: 100,200,400,600,800,1000– Smoothing filter m: 1,3,5,7,9,11

Page 42: Behavior-based Authentication Systems Multimedia Security

42

An Empirical Evaluation(3/6)

• Decision Tree Classifier

Page 43: Behavior-based Authentication Systems Multimedia Security

43

An Empirical Evaluation(4/6)

• Pair-Wise Discrimination:– Distinguish two people

– #6 and #18 with too few mouse movements

Page 44: Behavior-based Authentication Systems Multimedia Security

44

An Empirical Evaluation(5/6)

• Anomaly Detection:– False positive rate: authorized user -> intruder– False negative rate: intruder -> authorized user– A high false positive rate means too few mouse

events

Page 45: Behavior-based Authentication Systems Multimedia Security

45

An Empirical Evaluation(6/6)

• Smoothing Filter:

Page 46: Behavior-based Authentication Systems Multimedia Security

46

Future work

• Research the impact of replay attacks

• How best to apply unsupervised learning

• How to incorporate the results from different sources. (ex keystroke , mouse)