Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection

T. Neal, D. Woodard
{"title":"Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection","authors":"T. Neal, D. Woodard","doi":"10.1109/ICB45273.2019.8987407","DOIUrl":null,"url":null,"abstract":"The rise of mobile devices has contributed new biometric modalities which reflect behavioral tendencies as users interact with the device’s services. In this paper, we explore replay attacks against such systems and how a remote attack might affect authentication performance. There are few efforts that focus on replay attacks in mobile biometric systems, and none to our knowledge related to user-device interactions, such as the use of mobile apps. Instead, previous efforts have mainly considered spoofing attacks, which implicate that the attacker has learned their target’s behavior instead of obtaining a direct copy of logged behavior by theft. Here, we explore temporally-derived replay attacks that assume that application, Bluetooth, and Wi-Fi data has been captured remotely and then intelligently combined with some level of noise to avoid the replay of an exact copy of legitimate data. We study several factors that may affect replay attack detection, including the effects of varying the amount of data available during data collection, the number of samples used for training, and supervised and unsupervised learning on attack detection. In our analysis, false positive rates increased from 2.3% when using zero-effort attacks to over 40% as a result of replay attacks. However, our results also show that by contextualizing behavior in the feature representation, false positive rates decrease by over 25%.","PeriodicalId":430846,"journal":{"name":"2019 International Conference on Biometrics (ICB)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Biometrics (ICB)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICB45273.2019.8987407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The rise of mobile devices has contributed new biometric modalities which reflect behavioral tendencies as users interact with the device’s services. In this paper, we explore replay attacks against such systems and how a remote attack might affect authentication performance. There are few efforts that focus on replay attacks in mobile biometric systems, and none to our knowledge related to user-device interactions, such as the use of mobile apps. Instead, previous efforts have mainly considered spoofing attacks, which implicate that the attacker has learned their target’s behavior instead of obtaining a direct copy of logged behavior by theft. Here, we explore temporally-derived replay attacks that assume that application, Bluetooth, and Wi-Fi data has been captured remotely and then intelligently combined with some level of noise to avoid the replay of an exact copy of legitimate data. We study several factors that may affect replay attack detection, including the effects of varying the amount of data available during data collection, the number of samples used for training, and supervised and unsupervised learning on attack detection. In our analysis, false positive rates increased from 2.3% when using zero-effort attacks to over 40% as a result of replay attacks. However, our results also show that by contextualizing behavior in the feature representation, false positive rates decrease by over 25%.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
移动生物识别、重放攻击和行为分析:冒名顶替者检测的实证分析
移动设备的兴起催生了新的生物识别模式,这些模式反映了用户与设备服务交互时的行为趋势。在本文中,我们将探讨针对此类系统的重放攻击以及远程攻击如何影响身份验证性能。很少有人关注移动生物识别系统中的重播攻击,据我们所知,也没有人关注用户-设备交互,比如移动应用程序的使用。相反,以前的努力主要考虑欺骗攻击,这意味着攻击者已经了解了目标的行为,而不是通过盗窃获得记录行为的直接副本。在这里,我们将探讨暂时衍生的重放攻击,这些攻击假设应用程序、蓝牙和Wi-Fi数据已被远程捕获,然后智能地与某种程度的噪声相结合,以避免重放合法数据的精确副本。我们研究了可能影响重放攻击检测的几个因素,包括数据收集过程中可用数据量的变化,用于训练的样本数量,以及有监督和无监督学习对攻击检测的影响。在我们的分析中,误报率从使用零努力攻击时的2.3%增加到使用重放攻击时的40%以上。然而,我们的结果也表明,通过将特征表示中的行为语境化,误报率降低了25%以上。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PPG2Live: Using dual PPG for active authentication and liveness detection A New Approach for EEG-Based Biometric Authentication Using Auditory Stimulation A novel scheme to address the fusion uncertainty in multi-modal continuous authentication schemes on mobile devices Sclera Segmentation Benchmarking Competition in Cross-resolution Environment Fingerprint Presentation Attack Detection utilizing Time-Series, Color Fingerprint Captures
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1