Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2991079.2991096acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Gametrics: towards attack-resilient behavioral authentication with simple cognitive games

Published: 05 December 2016 Publication History

Abstract

Authenticating a user based on her unique behavioral bio-metric traits has been extensively researched over the past few years. The most researched behavioral biometrics techniques are based on keystroke and mouse dynamics. These schemes, however, have been shown to be vulnerable to human-based and robotic attacks that attempt to mimic the user's behavioral pattern to impersonate the user.
In this paper, we aim to verify the user's identity through the use of active, cognition-based user interaction in the authentication process. Such interaction boasts to provide two key advantages. First, it may enhance the security of the authentication process as multiple rounds of active interaction would serve as a mechanism to prevent against several types of attacks, including zero-effort attack, expert trained attackers, and automated attacks. Second, it may enhance the usability of the authentication process by actively engaging the user in the process.
We explore the cognitive authentication paradigm through very simplistic interactive challenges, called Dynamic Cognitive Games, which involve objects floating around within the images, where the user's task is to match the objects with their respective target(s) and drag/drop them to the target location(s). Specifically, we introduce, build and study Gametrics ("Game-based biometrics"), an authentication mechanism based on the unique way the user solves such simple challenges captured by multiple features related to her cognitive abilities and mouse dynamics. Based on a comprehensive data set collected in both online and lab settings, we show that Gametrics can identify the users with a high accuracy (false negative rates, FNR, as low as 0.02) while rejecting zero-effort attackers (false positive rates, FPR, as low as 0.02). Moreover, Gametrics shows promising results in defending against expert attackers that try to learn and later mimic the user's pattern of solving the challenges (FPR for expert human attacker as low as 0.03). Furthermore, we argue that the proposed biometrics is hard to be replayed or spoofed by automated means, such as robots or malware attacks.

References

[1]
A. Al Galib and R. Safavi-Naini. User authentication using human cognitive abilities. In Financial Cryptography and Data Security, pages 254--271. Springer, 2015.
[2]
F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC), 5(4):367--397, 2002.
[3]
R. Biddle, S. Chiasson, and P. V. Oorschot. Graphical passwords: Learning from the first generation. In Technical Report TR-09-09, School of Computer Science, Carleton University, 2009.
[4]
J. Brooke et al. Sus-a quick and dirty usability scale. Usability evaluation in industry, 189(194):4--7, 1996.
[5]
K.-T. Chen and L.-W. Hong. User identification based on game-play activity patterns. In Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, pages 7--12. ACM, 2007.
[6]
Chen, Kuan-Ta and Hong, Li-Wen. User Identification based on Game-Play Activity Patterns. In Workshop on Network and Systems Support for Games, 2007.
[7]
A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann. Touch me once and i know it's you!: Implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '12, pages 987--996, 2012.
[8]
P. Dunphy and J. Yan. Do background images improve "draw a secret" graphical passwords? In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 36--47. ACM, 2007.
[9]
C. Epp, M. Lippold, and R. L. Mandryk. Identifying emotional states using keystroke dynamics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 715--724. ACM, 2011.
[10]
Erick Schonfeld. Turiya Media: Data Mining Social Games To Find The Most Valuable Players. In Tech Crunch, Available at: http://techcrunch.com/2010/04/06/turiya-media-games, 2010.
[11]
M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. Information Forensics and Security, IEEE Transactions on, 8(1):136--148, 2013.
[12]
Gabriel Goldwasser. Collecting Data (and Strangers) Online. In The Faster Times, Available at: http://thefastertimes.com/videogames/2010/02/21/collecting-data-and-strangers-online, 2010.
[13]
A. Hern. Google aims to kill passwords by the end of this year. https://www.theguardian.com/technology/2016/may/24/google-passwords-android.
[14]
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin. The design and analysis of graphical passwords. In SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium, 1999.
[15]
C.-C. Lin, H. Li, X.-y. Zhou, and X. Wang. Screenmilker: How to milk your android screen for secrets. In NDSS, 2014.
[16]
R. A. Maxion and K. S. Killourhy. Keystroke biometrics with number-pad input. In Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on, pages 201--210. IEEE, 2010.
[17]
A. Messerman, T. Mustafic, S. A. Camtepe, and S. Albayrak. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In Biometrics (IJCB), 2011 International Joint Conference on, pages 1--8. IEEE, 2011.
[18]
M. Mohamed, N. Sachdeva, M. Georgescu, S. Gao, N. Saxena, C. Zhang, P. Kumaraguru, P. C. van Oorschot, and W.-B. Chen. A three-way investigation of a game-captcha: automated attacks, relay attacks and usability. In Proceedings of the 9th ACM symposium on Information, computer and communications security, pages 195--206. ACM, 2014.
[19]
M. Mohamed, B. Shrestha, and N. Saxena. Smashed: Sniffing and manipulating android sensor data. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pages 152--159. ACM, 2016.
[20]
F. Monrose and A. Rubin. Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security, pages 48--56. ACM, 1997.
[21]
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012.
[22]
T. S. B. Passfaces. http://www.realuser.com/. Last access, December 2008.
[23]
A. Perrig and D. Song. Hash visualization: a new technique to improve real-world security. In CrypTEC, 1999.
[24]
Pusara, Maja and Brodley, Carla E. User Re-Authentication via Mouse Movements. In Workshop on Visualization and Data Mining for Computer Security, 2004.
[25]
A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of facebook. In SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security, 2008.
[26]
Ryan Kaminsky, Miro Enev, and Erik Andersen. Identifying Game Players with Mouse Biometrics. Available at: http://abstract.cs.washington.edu/~miro/docs/mouse_ID.pdf, 2008.
[27]
S. E. Schechter, A. J. B. Brush, and S. Egelman. It's no secret. measuring the security and reliability of authentication via "secret" questions. In IEEE Symposium on Security and Privacy, pages 375--390, 2009.
[28]
S. E. Schechter and R. W. Reeder. 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), 2009).
[29]
A. Serwadda and V. V. Phoha. When kids' toys breach mobile phone security. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 599--610. ACM, 2013.
[30]
X. Suo, Y. Zhu, and G. S. Owen. Graphical passwords: A survey. In ACSAC, 2005.
[31]
C. M. Tey, P. Gupta, and D. Gao. I can be you: Questioning the use of keystroke dynamics as biometrics. The 20th Annual Network & Distributed System Security Symposium (NDSS 2013), 2013.
[32]
Valve Corporation. Steam: Game and Player Statistics. Available at: http://store.steampowered.com/stats, 2010.
[33]
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. D. Memon. PassPoints: Design and Longitudinal Evaluation of a Graphical Password System. In International Journal of Human Computer Studies, 2005.
[34]
S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget. Design and Evaluation of a Shoulder-surfing Resistant Graphical Password Scheme. In Proceedings of the working conference on Advanced visual interfaces (AVI), 2006.
[35]
N. Zheng, A. Paloski, and H. Wang. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM conference on Computer and communications security, pages 139--150. ACM, 2011.
[36]
Y. Zhong, Y. Deng, and A. K. Jain. Keystroke dynamics for user authentication. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2012 IEEE Computer Society Conference on, pages 117--123. IEEE, 2012.

Cited By

View all
  • (2023)New Cognitive Deep-Learning CAPTCHASensors10.3390/s2304233823:4(2338)Online publication date: 20-Feb-2023
  • (2023)Complementing Biometric Authentication System with Cognitive SkillsMicroelectronics, Circuits and Systems10.1007/978-981-99-0412-9_41(457-465)Online publication date: 27-Jun-2023
  • (2021)Press ${@}{\$}{@}{\$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures2021 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP51992.2021.00016(71-87)Online publication date: Sep-2021
  • Show More Cited By
  1. Gametrics: towards attack-resilient behavioral authentication with simple cognitive games

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
    December 2016
    614 pages
    ISBN:9781450347716
    DOI:10.1145/2991079
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ACSA: Applied Computing Security Assoc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 December 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Funding Sources

    • Comcast

    Conference

    ACSAC '16
    Sponsor:
    • ACSA
    ACSAC '16: 2016 Annual Computer Security Applications Conference
    December 5 - 8, 2016
    California, Los Angeles, USA

    Acceptance Rates

    Overall Acceptance Rate 104 of 497 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 19 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)New Cognitive Deep-Learning CAPTCHASensors10.3390/s2304233823:4(2338)Online publication date: 20-Feb-2023
    • (2023)Complementing Biometric Authentication System with Cognitive SkillsMicroelectronics, Circuits and Systems10.1007/978-981-99-0412-9_41(457-465)Online publication date: 27-Jun-2023
    • (2021)Press ${@}{\$}{@}{\$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures2021 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP51992.2021.00016(71-87)Online publication date: Sep-2021
    • (2021)A Statistical (Process Monitoring) Perspective on Human Performance Modeling in the Age of Cyber-Physical SystemsFrontiers in Statistical Quality Control 1310.1007/978-3-030-67856-2_12(197-228)Online publication date: 16-May-2021
    • (2019)Challenge-response behavioral mobile authenticationProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359838(355-365)Online publication date: 9-Dec-2019
    • (2019)CATCHA: When Cats Track Your Movements OnlineInformation Security Practice and Experience10.1007/978-3-030-34339-2_10(172-193)Online publication date: 6-Nov-2019
    • (2019)Towards an Adaption and Personalisation Solution Based on Multi Agent System Applied on Serious GamesArtificial Intelligence Applications and Innovations10.1007/978-3-030-19823-7_49(584-594)Online publication date: 12-May-2019
    • (2018)Examining Security and Privacy Research in Developing RegionsProceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies10.1145/3209811.3209818(1-14)Online publication date: 20-Jun-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media