• DocumentCode
    4727
  • Title

    A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol

  • Author

    Irakiza, David ; Karim, Md E. ; Phoha, V.V.

  • Author_Institution
    Center for Secure Cyberspace, Louisiana Tech Univ., Ruston, LA, USA
  • Volume
    9
  • Issue
    7
  • fYear
    2014
  • fDate
    Jul-14
  • Firstpage
    1133
  • Lastpage
    1140
  • Abstract
    We introduce a non-interactive dual-channel protocol for continuous traffic authentication and analyze its security properties. We realize the proposed protocol by facilitating dual channels at the keyboard with the assistance of a lightweight hardware module. The proposed protocol does not require users´ explicit engagement in the authentication process. Empirical results show that, for a 30-day period, the maximum false reject rate for all legitimate requests on a day is 6% (with a 30 day daily average of 2.4%) and the false accept rate on any given day is 0%. The daily maximum false reject rate of the user requests falls to 0% if the users are forced to engage explicitly in the protocol operation for a maximum of 1.2% of users´ non-typed requests.
  • Keywords
    cryptographic protocols; keyboards; authentication process; continuous traffic authentication; keyboard; lightweight hardware module; noninteractive dual channel continuous traffic authentication protocol; security property; time 30 day; Authentication; Computers; Hardware; Malware; Protocols; Servers; Authentication; information exfiltration; non-interactive dual channel protocol;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2014.2323700
  • Filename
    6815645