Title :
Covert Cognitive Games and User Response Patterns
Author :
Wheeler, J. ; Varner, D. ; Carrola, J. ; Dahlberg, Christian ; Thornton, T. ; Bohil, C. ; Terry, K.
Abstract :
The research team developed a novel method for authenticating computer user identity by deploying covert games disguised as Windows alerts. The method applies game theory principles, allowing users to develop unique strategies for playing the imperceptible games. By examining users´ subconscious game playing strategies, the team captured discriminatory information without sophisticated analysis. Results indicated none of the participants detected the game, although many reported strategizing when they chose how they would respond to the game interruptions. Ten attributes characterizing all participants were identified and compared in a similarity matrix and then reduced through MDS techniques. An optimal subspace of the variables was identified and used to construct a ROC curve. The hit rate exceeded 80 percent. The false alarm rate was higher than desired; however, evidence indicates this can be reduced through further research. This article is part of a special issue on security.
Keywords :
computer games; game theory; matrix algebra; message authentication; MDS techniques; ROC curve; Windows alerts; computer user identity; covert cognitive games; game interruptions; game playing strategies; game theory principles; similarity matrix; user response patterns; Authentication; Data models; Fingerprint recognition; Game theory; Games; Identity management; Productivity; active authentication; cognitive games; information technology; security;
Journal_Title :
IT Professional
DOI :
10.1109/MITP.2013.58