A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol

被引:2
作者
Irakiza, David [1 ]
Karim, Md E. [1 ]
Phoha, Vir V. [1 ]
机构
[1] Louisiana Tech Univ, Ctr Secure Cyberspace, Ruston, LA 71272 USA
关键词
Information exfiltration; non-interactive dual channel protocol; authentication;
D O I
10.1109/TIFS.2014.2323700
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a non-interactive dual-channel protocol for continuous traffic authentication and analyze its security properties. We realize the proposed protocol by facilitating dual channels at the keyboard with the assistance of a lightweight hardware module. The proposed protocol does not require users' explicit engagement in the authentication process. Empirical results show that, for a 30-day period, the maximum false reject rate for all legitimate requests on a day is 6% (with a 30 day daily average of 2.4%) and the false accept rate on any given day is 0%. The daily maximum false reject rate of the user requests falls to 0% if the users are forced to engage explicitly in the protocol operation for a maximum of 1.2% of users' non-typed requests.
引用
收藏
页码:1133 / 1140
页数:8
相关论文
共 17 条
[1]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[2]  
Borders K., 2004, CCS 04 P 11 ACM C CO, P110
[3]   Summary cache: A scalable wide-area Web cache sharing protocol [J].
Fan, L ;
Cao, P ;
Almeida, J ;
Broder, AZ .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (03) :281-293
[4]  
Gehrmann C., 2004, RSA CRYPTOBYTES, V7, P29
[5]  
Gummadi R., 2009, NSDI, V9, P307
[6]  
GUPTA P, 2000, THESIS STANFORD U ST
[7]  
Mashatan A., 2006, P IACR CRYPT EPRINT, P302
[8]   Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey [J].
Nguyen, L. H. ;
Roscoe, A. W. .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (01) :139-201
[9]  
Nguyen L. H., 2009, P IACR CYRPT EPRINT, P3
[10]  
Pasini S, 2006, LECT NOTES COMPUT SC, V3860, P280