DocumentCode
43905
Title
Covert Cognitive Games and User Response Patterns
Author
Wheeler, J. ; Varner, D. ; Carrola, J. ; Dahlberg, Christian ; Thornton, T. ; Bohil, C. ; Terry, K.
Volume
15
Issue
4
fYear
2013
fDate
July-Aug. 2013
Firstpage
16
Lastpage
19
Abstract
The research team developed a novel method for authenticating computer user identity by deploying covert games disguised as Windows alerts. The method applies game theory principles, allowing users to develop unique strategies for playing the imperceptible games. By examining users´ subconscious game playing strategies, the team captured discriminatory information without sophisticated analysis. Results indicated none of the participants detected the game, although many reported strategizing when they chose how they would respond to the game interruptions. Ten attributes characterizing all participants were identified and compared in a similarity matrix and then reduced through MDS techniques. An optimal subspace of the variables was identified and used to construct a ROC curve. The hit rate exceeded 80 percent. The false alarm rate was higher than desired; however, evidence indicates this can be reduced through further research. This article is part of a special issue on security.
Keywords
computer games; game theory; matrix algebra; message authentication; MDS techniques; ROC curve; Windows alerts; computer user identity; covert cognitive games; game interruptions; game playing strategies; game theory principles; similarity matrix; user response patterns; Authentication; Data models; Fingerprint recognition; Game theory; Games; Identity management; Productivity; active authentication; cognitive games; information technology; security;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2013.58
Filename
6560003
Link To Document