Вы находитесь на странице: 1из 2

Proceedings of the 2005 IEEE

Workshop on Information Assurance and Security


United States Military Academy, West Point, NY

Anomaly Intrusion Detection based on Biometrics


Ahmed Awad E. Ahmed, and lssa Traore, Member, IEEE
Department of Electrical and Computer Engineering, University of Victoria
P.O. Box 3055 STN CSC Victoria, B.C. VXW 3P6 CANADA
aahmed(GIece.uvic.ca, itraoreC~ece.iivic.ca

In this work we introduce the idea of using behavioral The detection mode shares the first two stages with the
biometrics in intrusion detection applications. We propose enrollment mode. The third stage in this mode is the
a new approach to user profiling, which can be used to verification process where the signature calculated during
detect intrusion without the need for any special hardware the data processing stage is compared against the
implementation and without forcing the user to perfom reference signature of the legitimate user. Different
any special actions’. The technique is based on using comparison algorithms are used for each signature factor;
“keystroke dynamics” and “mouse dynamics” biometrics. the more the deviation from the reference signature, the
The profiles computed in this case are more accurate than less the system is confident in the identity of the user.
those obtained through the traditional statistical profiling Keystroke dynamics is considered a strong behavioral
techniques, since they are based on distinctive biological biometric [ 1,2,3]. The functionality of this biometric is to
Characteristics of users.. measure the dwell time (the length of time a key is held
Using biometrics in intrusion detection systems opens a down) and flight time (the time to move from one key to
new dimension in the detection process. By combining another) for keyboard actions. After these measurements
traditional intrusion detection systems that focus on the have been collected, then the collected actions are
actions performed by the user, with biometrics that focus translated into a number of digraphs or tri-gruphs to be
on the identity of the user, such systems are able to detect analyzed in order to produce a pattem that identifies the
the type of intrusion where an attacker gains access to the user who generated these keyboard actions.
resources and starts to perform normal non-intrusive Table 1 shows a combination of tri-graphs generated
procedures, causing information leakage or any other from three sessions for two different users, and the
vulnerabilities. Differences in usage pattern cannot be corresponding time used to perform the tri-graphs in
detected if the attacker knows the operation sequences milliseconds. The tri-graphs shown are centered by the
and his access limits; such an attack, however, can be character ‘a’ (ASCII code 65). From the table we can
uncovered if the detection is based on biometrics notice the similarity between the response time for the
information. first user’s sessions, we can also notice obvious difference
Like all other biometric systems, our detector operates in in behavior between the two users which can easily be
two modes: enrollment mode, and detected for some of the tri-graphs (marked in bold).
identificationherifcation mode. The operation of each In access control applications the extracted group of
mode consists of three consecutive stages. In the first digraphs and tri-graphs are pre-defined since the user is
stage of the enrollment mode, a data capturing process is asked to enter a paragraph containing them. In intrusion
conducted by a lightweight software module, which detection applications, however, this scenario is not
captures all mouse and keyboard actions, and converts applicable. Detecting the behavior from an unexpected set
them into a set of more organized and meaningful of digraphs requires large amount of data to be collected
statements. These statements are directly passed to the in the enrollment mode so as to cover a higher percentage
next stage of data processing where behavioral modeling of the captured data in the verification mode.
and feature extraction is conducted. This process Our detection algorithm generates a Keystroke Dynamics
accumulates all actions received from the previous Signature or KDS, which is used as a reference user
process over a pre-defined session period and performs a profile and matched against active user profiles to
number of algorithms on the data to produce the Mouse dynamically detect masqueraders.
Dynamics Signature (MDS) and Keystroke Dynamics To construct the KDS, we propose a key oriented neural
Signature (KOS) for the user being monitored [ 5 ] . Finally, network based approach, where a neural network is
in the third stage, the generated signature is stored in a trained for each keyboard key to best simulate its usage
database as a reference signature for the enrolled user, dynamics with reference to other keys. We also propose a
technique which can be used to approximate a di-
graphhi-graph value based on other detected graphs and

‘ Patent Pending
0-7803-9290-6/05/$20.00 02005 IEEE. 452
Proceedings of the 2005 IEEE
Workshop on Information Assurance and Security
United States Military Academy, West Point, NY

denoted MSD. The x-axis represents the traveled distance


and the y-axis represents the movement speed, Each point
on the figure represents an intercepted mouse action. The
Tti-graph Uaet 1 UBar 1
figure shows a comparison between six signatures for the
-11 Cod. Smssion 1 Smmsloa P same user and the reference signature of a different user.
87-65-68 86 85 73 From the figure we can notice the closeness of the profiles
83-65-89 a3 a2 69 of the same user, and their distinctiveness with respect to
71-65-78 16 IO 60 the reference signature of a different user. The
70-65-64 134 112 62
82-65-72 122 92 80
comparison techque used for this factor consists of
77-65-18 74 16 68 computing the sum of the absolute difference between the
87-65-68 80 81 71 curves. This represents how far the curves are from each
83-65-83 71 75 111 other; if it is higher than a threshold then those curves
83-65-76 62 62 59
83-65-76 67 64 63
belong to two different users. The threshold can be
76-65-77 143 205 56 determined for each user during the enrollment phase
when the reference mouse signature is generated.
We have conducted some experiments involving 22
participants, and collected experimental data aver 9
Mouse dynamics is a new behavioral biometric recently weeks, Participants installed the client software and used
introduced [4]. The idea behind ths biometric is to their machine for their routine activities. Mouse and
monitor all mouse actions generated as a result of user keystroke data was collected transparently and sent to a
interaction with a graphical user interface, and then central server. At the end of the data collection phase, we
process the data obtained from these actions in order to used the collected data to conduct an offline evaluation of
analyze the behavior of the user. Mouse actions include our detection system. To do so, we divided the
general mouse movement, drag and drop, point and click, participants into 2 groups: a group of 10 representing
and silence (i.e. no movement). authorized users and a group of 12 representing
The behavioral analysis utilizes neural networks and unauthorized users. In this experiment we obtained a false
statistical approaches to generate a number of factors negative rate of 0.651% and a false positive rate of
from the captured set of actions. These factors are used to 1.312%.
construct what is called a Mouse Dynamics Signature or
MDS, a unique set of values characterizing the user’s REFERENCES
behavior over the monitoring period. Some of the factors
consist of calcuiating the average speed against the [ I ] Gaines, R., Lisowski, W., Press, S., Shapiro, N.,
traveled distance, or calculating the average speed 1980. Authentication by Keystroke Timing: Some
against the movement direction, In [4]up to seven factors Preliminary Results. Rand. Report R-256-NSF. Rand
that c h b i t strong stability and uniqueness capability are Corporation.
reported.
[Z] Legget, J, Williams, G., 1988. Dynamic Identity
Verification via Keystroke Characteristics. Int. J.
‘1 Man-Mach. Stud. 35,859-870.
131 Bleha, S . , SIivinsky, C . , Hussein, B., 1990.
Computer-access Security Systems using Keystroke
Dynamics, IEEE Trans. Patt. Anal. Mach. Int. PAMI-
12, 12,1217-1222.
[4] A.A.E. Ahmed, I. Traore “A New Biometrics
Technology based on Mouse Dynamics”, Technical
Report ECE-03-5, University of Victoria, Department
of Electrical and Computer Engineering, Victoria,
Canada, September 2003.
IS] A.A.E. b e d , I. Traore “Security Monitoring
I
OO 1 0 0 2 m W I ) r m m l s a , 7 a , a o , o o o
i through Human Computer Interaction Devices ”,
Draft Technical Report , University of Victoria,
Tnyeled hstwxe(puels) Department of Electrical and Computer Engineering,
Figure 4: Active profiles ofa given user compared to the reference
profile ofa different user
Victoria, Canada, March 2004.

Figure 1 shows an example of biometrics profiles based


on the average speed against the traveled distance factor
0-7803-9290-6/05/$20.00 82005 IEEE. 453

Вам также может понравиться