DocumentCode :
3289205
Title :
Mimicry Attack on Strategy-Based Behavioral Biometric
Author :
Yampolskiy, Roman V.
Author_Institution :
Univ. at Buffalo, Buffalo
fYear :
2008
fDate :
7-9 April 2008
Firstpage :
916
Lastpage :
921
Abstract :
Biometric security measures are becoming a popular approach to securing computer systems, computer networks, as well as access to workplaces and recreational facilities. Unfortunately biometric systems can be a target of impersonation attacks, making their security questionable. In this paper we concentrate on ways of spoofing behavioral biometrics and analyze the types of spoofing attacks which can be employed against biometric systems. The concept of strategy-based behavioral biometrics is introduced followed by our experimental results from spoofing security systems based on strategy-based biometric technology. Finally an existing methodology is suggested to counteract spoofing attacks against behavior-based biometric systems.
Keywords :
authorisation; biometrics (access control); behavior-based biometric system; biometric security measure; computer network security; mimicry attack; spoofing behavioral biometrics; spoofing security system; strategy-based behavioral biometrics; Bioinformatics; Biometrics; Computer networks; Computer security; Data security; Employment; Face detection; Fingerprint recognition; Fingers; Waveguide discontinuities; Behavior; Biometric; Mimicry; Poker; Spoofing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
0-7695-3099-0
Type :
conf
DOI :
10.1109/ITNG.2008.78
Filename :
4492601
Link To Document :
بازگشت