Conference item
Preventing lunchtime attacks: fighting insider threats with eye movement biometrics
- Abstract:
- We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power along with the ability to gauge the users’ task familiarity, i.e., level of knowledge, to address insider threats. In a controlled experiment we test how both time and task familiarity influence eye movements and feature stability, and how different subsets of features affect the classifier performance. These feature subsets can be used to tailor the eye movement biometric to different authentication methods and threat models. Our results show that eye movement biometrics support reliable and stable identification and authentication of users. We investigate different approaches in which an attacker could attempt to use inside knowledge to mimic the legitimate user. Our results show that while this advance knowledge is measurable, it does not increase the likelihood of successful impersonation. In order to determine the time stability of our features we repeat the experiment twice within two weeks. The results indicate that we can reliably authenticate users over the entire period. We show that the classification decision depends on all features and mimicking a few of them will not be sufficient to trick the classifier. We discuss the advantages and limitations of our approach in detail and give practical insights on the use of this biometric in a real-world environment.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Version of record, pdf, 2.6MB, Terms of use)
-
- Publisher copy:
- 10.14722/ndss.2015.23203
Authors
- Publisher:
- Internet Society
- Host title:
- Network and Distributed System Security (NDSS) Symposium
- Journal:
- Network and Distributed System Security (NDSS) Symposium More from this journal
- Publication date:
- 2015-02-01
- DOI:
- ISBN:
- 189156238X
- Keywords:
- Pubs id:
-
pubs:576193
- UUID:
-
uuid:01d8ca27-a0cd-4256-8838-65725960734f
- Local pid:
-
pubs:576193
- Deposit date:
-
2016-09-12
Terms of use
- Copyright holder:
- Internet Society
- Copyright date:
- 2015
- Notes:
-
Permission to freely reproduce all or part of this paper for noncommercial
purposes is granted provided that copies bear this notice and the full citation
on the first page. Reproduction for commercial purposes is strictly prohibited
without the prior written consent of the Internet Society, the first-named author
(for reproduction of an entire paper only), and the author’s employer if the
paper was prepared within the scope of employment.
If you are the owner of this record, you can report an update to it here: Report update to this record