RLAuth: A Risk-Based Authentication System Using Reinforcement Learning

被引:3
作者
Picard, Claudy [1 ]
Pierre, Samuel [1 ]
机构
[1] Polytech Montreal, Mobile Comp & Networking Res Lab LARIM, Montreal, PQ H3T 1J4, Canada
关键词
Anomaly detection; deep reinforcement learning; imbalanced classification; risk-based authentication; MANAGEMENT; FRAMEWORK; INTERNET; SECURE;
D O I
10.1109/ACCESS.2023.3286376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional authentication systems, that are used to protect most modern mobile applications, are faced with usability and security problems related to their static and one-shot nature. Indeed, one-shot authentication mechanisms challenge the user at the beginning of a session leaving them vulnerable to attacks on lost/stolen devices or session hijacking. In addition, static authentication mechanisms always use the same challenges to authenticate the user without considering the dynamic nature of the risk related to the authentication context. To mitigate these challenges, we propose RLAuth, a risk-based authentication system that can automatically adapt the level of challenge presented to the user on each authentication request based on the current context. RLAuth is based on binary anomaly detection, which is solved using a deep reinforcement learning agent that acts as the classifier. To cope with the high class imbalance in the anomaly detection problem, we propose to use a balanced sampling technique during experience replay and an imbalanced correction factor during reward computation. We evaluate RLAuth on a public dataset using the G-mean metric which is the square root of the product of sensitivity with specificity. This metric is efficient to measure the classification performance of a model under class imbalance since it does not overfit to the majority class. Finally, RLAuth obtained a G-Mean of 92.62%. In addition, the reinforcement learning agent can be trained offline for acceptable results in about 130 s and can then be periodically retrained to improve its performance over time.
引用
收藏
页码:61129 / 61143
页数:15
相关论文
共 55 条
[1]   AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors [J].
Abuhamad, Mohammed ;
Abuhmed, Tamer ;
Mohaisen, David ;
Nyang, DaeHun .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) :5008-5020
[2]   A survey on continuous authentication methods in Internet of Things environment [J].
Al-Naji, Fatimah Hussain ;
Zagrouba, Rachid .
COMPUTER COMMUNICATIONS, 2020, 163 :109-133
[3]   A novel transparent user authentication approach for mobile applications [J].
Alotaibi, Saud Nejr ;
Furnell, Steven ;
Clarke, Nathan .
INFORMATION SECURITY JOURNAL, 2018, 27 (5-6) :292-305
[4]   A Survey on Adaptive Authentication [J].
Arias-Cabarcos, Patricia ;
Krupitzer, Christian ;
Becker, Christian .
ACM COMPUTING SURVEYS, 2019, 52 (04)
[5]   Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes [J].
Ashibani, Yosef ;
Kauling, Dylan ;
Mahmoud, Qusay H. .
APPLIED SYSTEM INNOVATION, 2019, 2 (01) :1-20
[6]  
Aviv A. J., 2010, P 4 USENIX C OFF TEC, V10, P1
[7]  
Babu B.S., 2009, Int. J. Netw. Secur., V8, P59
[8]   DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing [J].
Cai, Rizhao ;
Li, Haoliang ;
Wang, Shiqi ;
Chen, Changsheng ;
Kot, Alex C. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :937-951
[9]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[10]   Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems [J].
Ferdowsi, Aidin ;
Saad, Walid .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) :1371-1387