Mitigating Snoop-Forge-Replay Attack by Integrating Text-Based and Language-Based Traits with the Keystroke Verification System
نویسنده
چکیده
A new attack called the snoop-forge-replay attack is presented on keystroke-based continuous verification systems. The snoop-forge-replay is a sample-level forgery attack and is not specific to any particular keystroke-based continuous verification method or sysem. It can be launched with easily available keyloggers and APIs for keystroke synthesis. Our results ffrom 2460 experiments show that: 1)the snoop-forge-replay attacks achieve alarmingly high error rates compared to zero-effort imposter attacks, which have been the de facto standard for evaluating keystroke-based continuous verification systems; 2)four state-of-the –art verification methods, three types of keystroke latencies, and 11 matching-pair settings(a key parameter in continuous verification with keystrokes) that is examined here were suspectible to the attack; 3)the attack is effective even when as low as 20 to 100 keystrokes were snooped to create forgeries.
منابع مشابه
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, we consider the effects of synthetic forgery attacks in the context...
متن کاملInterference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter
The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...
متن کاملVerifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Networks
Verifying physical presence of a neighbor in wireless ad hoc networks is one of the key components in developing protocols resilient to replay-based attacks. For this, we first consider the RTT-based verification and revise it along with a probabilistic approach. We then consider a power-based approach and couple it with RTT-based approach to design an effective neighbor verification protocol (...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملThe Impact of Summary Writing with Structure Guidelines on EFL College Students’ Rhetorical Organization: Integrating Genre-Based and Process Approaches
This study aimed at investigating the impact of writing on Iranian EFL college students’ rhetorical organization. Thirty Iranian female undergraduate students majoring in English at Al-zahra University participated in the current study. The writing instructions included two stages, each lasting for four weeks. The participants were assigned to a control group and an experimental group according...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014