DocumentCode :
4727
Title :
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
Author :
Irakiza, David ; Karim, Md E. ; Phoha, V.V.
Author_Institution :
Center for Secure Cyberspace, Louisiana Tech Univ., Ruston, LA, USA
Volume :
9
Issue :
7
fYear :
2014
fDate :
Jul-14
Firstpage :
1133
Lastpage :
1140
Abstract :
We introduce a non-interactive dual-channel protocol for continuous traffic authentication and analyze its security properties. We realize the proposed protocol by facilitating dual channels at the keyboard with the assistance of a lightweight hardware module. The proposed protocol does not require users´ explicit engagement in the authentication process. Empirical results show that, for a 30-day period, the maximum false reject rate for all legitimate requests on a day is 6% (with a 30 day daily average of 2.4%) and the false accept rate on any given day is 0%. The daily maximum false reject rate of the user requests falls to 0% if the users are forced to engage explicitly in the protocol operation for a maximum of 1.2% of users´ non-typed requests.
Keywords :
cryptographic protocols; keyboards; authentication process; continuous traffic authentication; keyboard; lightweight hardware module; noninteractive dual channel continuous traffic authentication protocol; security property; time 30 day; Authentication; Computers; Hardware; Malware; Protocols; Servers; Authentication; information exfiltration; non-interactive dual channel protocol;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2014.2323700
Filename :
6815645
Link To Document :
بازگشت