首页> 外文会议>2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) >Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
【24h】

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes

机译:使冒名顶替者通过率变得毫无意义:一种通过按键连续进行网络行为验证的探听伪造重放攻击案例

获取原文

摘要

Previous efforts in continuous cyber-behavioral verification have considered only zero-effort impostor attacks. Taking continuous verification with keystroke dynamics as a case in point, we demonstrate that forgery attempts created using snooped information (stolen keystroke timing information in our case) have alarmingly high success rates. In our experiments, with as little as 50 to 200 snooped keystrokes (roughly, less than two lines of text typed in a typical email), we were able to create forgeries that had as high as 87.75 percent success rates against verifier configurations that showed less than 11 percent “zero-effort” impostor pass rates. We performed experiments using keystroke data from 50 users who typed approximately 1300 to 2900 keystrokes of free text during three different periods. Our experiments consisted of two parts. In the first part, we conducted zero-effort verification experiments with two verifiers (“R” and “S”) and obtained EERs between 10 and 15 percent under various verifier configurations. In the second part, we replayed 10,000 forged impostor attempts per user and demonstrated how the zero-effort impostor pass rates became meaningless when impostor attempts were created using stolen keystroke timing information.
机译:以前在持续的网络行为验证中所做的努力仅考虑了零努力冒充者攻击。以连续的击键动态验证为例,我们证明了使用监听信息(在本例中为偷窃的击键时间信息)创建的伪造尝试具有惊人的高成功率。在我们的实验中,只有50到200次监听按键(通常,在一封典型的电子邮件中键入的文字少于两行),我们能够创建伪造品,而对于验证者配置却显示出较少的成功率,伪造品的成功率高达87.75%。超过“零努力”冒名顶替者通过率的11%。我们使用来自50个用户的击键数据进行了实验,他们在三个不同的时期内输入了大约1300至2900个自由文本击键。我们的实验包括两个部分。在第一部分中,我们使用两个验证器(“ R”和“ S”)进行了“零努力”验证实验,并在各种验证器配置下获得了10%至15%的EER。在第二部分中,我们重播了每位用户10,000次伪造的冒名顶替者尝试,并演示了当使用被盗的击键时间信息创建冒名顶替者尝试时,零努力的冒名顶替者通过率变得毫无意义。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号