• DocumentCode
    43905
  • Title

    Covert Cognitive Games and User Response Patterns

  • Author

    Wheeler, J. ; Varner, D. ; Carrola, J. ; Dahlberg, Christian ; Thornton, T. ; Bohil, C. ; Terry, K.

  • Volume
    15
  • Issue
    4
  • fYear
    2013
  • fDate
    July-Aug. 2013
  • Firstpage
    16
  • Lastpage
    19
  • Abstract
    The research team developed a novel method for authenticating computer user identity by deploying covert games disguised as Windows alerts. The method applies game theory principles, allowing users to develop unique strategies for playing the imperceptible games. By examining users´ subconscious game playing strategies, the team captured discriminatory information without sophisticated analysis. Results indicated none of the participants detected the game, although many reported strategizing when they chose how they would respond to the game interruptions. Ten attributes characterizing all participants were identified and compared in a similarity matrix and then reduced through MDS techniques. An optimal subspace of the variables was identified and used to construct a ROC curve. The hit rate exceeded 80 percent. The false alarm rate was higher than desired; however, evidence indicates this can be reduced through further research. This article is part of a special issue on security.
  • Keywords
    computer games; game theory; matrix algebra; message authentication; MDS techniques; ROC curve; Windows alerts; computer user identity; covert cognitive games; game interruptions; game playing strategies; game theory principles; similarity matrix; user response patterns; Authentication; Data models; Fingerprint recognition; Game theory; Games; Identity management; Productivity; active authentication; cognitive games; information technology; security;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2013.58
  • Filename
    6560003