Internet Authentication Based on Personal History – A Feasibility Test Ann Nosseir, Richard Connor, Mark Dunlop University of Strathclyde Computer and.

Slides:



Advertisements
Similar presentations
The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
Advertisements

A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Copyright © 2010, 2007, 2004 Pearson Education, Inc. Chapter 11 Understanding Randomness.
Chapter 4 – Reliability Observed Scores and True Scores Error
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Test Taking Skills & Strategies
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Introduction to Databases
Building Robust and Automatic Authentication Systems with Activity- Based Personal Questions Mentor: Danfeng Yao Anitra Babic Chestnut Hill College Computer.
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
1 Securing Passwords Against Dictionary Attacks Base on an article by Benny Pinkas & Tomas Sander 2002 Presented by Tomer Conforti.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Chapter 10: Authentication Guide to Computer Network Security.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Information Security for Managers (Master MIS)
DigiCa$h: Money of the Future? or an Electronic Disaster? By: EDWARD ARTECHE MARLON EVANGELISTA.
BY CHEN YEAH TECK Image-Based Authentication for Mobile Phones: Performance and User Opinions Source: Slippery Brick (2006)
Presented by: Lin Jie Authors: Xiaoyuan Suo, Ying Zhu and G. Scott. Owen.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
EAssessment Colin Milligan Heriot-Watt University.
Password security Dr.Patrick A.H. Bours. 2 Password: Kinds of passwords Password A string of characters: PIN-code A string.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
1-1 Copyright © 2015, 2010, 2007 Pearson Education, Inc. Chapter 10, Slide 1 Chapter 10 Understanding Randomness.
Understanding Randomness Chapter 11. Why Be Random? What is it about chance outcomes being random that makes random selection seem fair? Two things: –
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
G53SEC 1 Authentication and Identification Who? What? Where?
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Computer Memory Chips Vs. Human Memory Computer Memory Chips Vs. Human Memory Agenda Introduction What does ( memory ) mean ? Brain memory V.S computer.
Slide Understanding Randomness.  What is it about chance outcomes being random that makes random selection seem fair? Two things:  Nobody can.
Evaluating Results of Learning Blaž Zupan
G53SEC 1 Authentication and Identification Who? What? Where?
Prepared by: A. T. M. Monawer Success in EPT Listening & Speaking Reading Writing Listening &Speaking Reading Writing.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Lecture 7 Page 1 CS 236 Online Authentication CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Understanding Randomness.  Many phenomena in the world are random: ◦ Nobody can guess the outcome before it happens. ◦ When we want things to be fair,
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Chapter 10 Understanding Randomness. Why Be Random? What is it about chance outcomes being random that makes random selection seem fair? Two things: –
CSCE 201 Identification and Authentication Fall 2015.
1 Chapter 11 Understanding Randomness. 2 Why Be Random? What is it about chance outcomes being random that makes random selection seem fair? Two things:
Research Methods in Psychology Introduction to Psychology.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
The accuracy of averages We learned how to make inference from the sample to the population: Counting the percentages. Here we begin to learn how to make.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Statistics 11 Understanding Randomness. Example If you had a coin from someone, that they said ended up heads more often than tails, how would you test.
The Law of Averages. What does the law of average say? We know that, from the definition of probability, in the long run the frequency of some event will.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Portfolio Assessment Jennifer Goodman. Azzam, A. M. (2007). Left Behind--By Design. Educational Leadership, 65(4), Focuses on No Child Left Behind.
PASSWORD SECURITY A Melbourne Athenaeum Library
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
An introduction to Research Methods
Towards Human Computable Passwords
Evaluating Results of Learning
Understanding Randomness
Human Computable Passwords
Use Your Illusion: Secure Authentication Usable Anywhere
Cloud vs Local: Better Data Storage Device
Understanding Randomness
A mobile single sign-on system
Stat 217 – Day 28 Review Stat 217.
Unit 6: Application Development
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

Internet Authentication Based on Personal History – A Feasibility Test Ann Nosseir, Richard Connor, Mark Dunlop University of Strathclyde Computer and Information Sciences

Goal of the Study Is to assess the feasibility of distinguishing the two groups Person & Impostor

Introduction On the Internet, there is an uneasy tension between the security and usability of authentication mechanisms

How we are authenticated? Authentication Scheme Stajano, three-part classification is "something you know" (e.g. password); "something you hold" (e.g. device holding digital certificate), "who you are" (e.g. biometric assessment) Each of these has well-known problems; passwords are written down, guessable, or forgotten; devices are lost or stolen, and biometric assays alienate users.

Context Human Mobility e.g. internet coffee Authentication Characteristics Mobile Lightweight Low in cost " something you know"

Passwords are not without Human Problems Yan and his colleagues 2004 in Cambridge University Computer Laboratory There are trade offs between good non-guessable passwords and the limitations of the human memory. It is hard for users to remember random passwords, but others are guessable; although passwords provide users with mobility, they can be stolen, guessed, or cracked.

Our Solution Light weight Memorable Mobile Low in cost

Electronic Personal History. 1.The personal history.it is not given. 2.It has a characteristic that it is very large so nobody can remember except the person him self. But what are good authentication questions?

Solutions “ Related Work ” Question Based Facts and Opinion Cognitive Passwords –Question Based Zviran 1990 Challenge Response Questions Cartwright 2004 Recognition-Based, rather than Recall-Based Opinion Image Portfolios Dhamija and Perring 2002 Passfaces Brostoff and Sasse 2000

Question Based-Model

Two Pilot Studies Population in both experiments includes the people who have and use electronic calendar either in palm format or Microsoft format Experiment One a. Sample size (Six calendar data of the staff) b. No. of Questions (5) Randomly selected c. Kind of questions (true/ false)

First Experiment Results Surprising results 1.The person can’t remember his calendar 2.Others scored better that the person him self in a few questions.

Sensitivity and Specificity Not the personIs the person First Test (Sensitivity) (True Positive) Correct answer ‘ Positive’ 0.5 (Specificity) (True Negative) 0.47Wrong answer ‘Negative’ 11

Human Memory Long-term memory is divided into episodic, procedural and semantic memory. In our research, we have focused on the long-term memory and in particular the episodic memory which some researchers define it as autobiographical memory. Baddeley, A. 1997

Parameter ( Human Memory ) Psychology Parameters Recent Repetitive Pleasant Experiments Parameters Easy Difficult

Second Experiment a. Sample size (9 calendar data of the staff) b. No. of Questions (8) c. Kind of questions (6 true/ false) (Recent, Repetitive, Pleasant) & (2 Multiple Choice) for each (Easy and Difficult)

Sensitivity and Specificity Second Test Answer GenuineImpostor Correct0.71 ± Wrong ±0.10 Total11

Sensitivity and Specificity Multiple- Choice Questions Answer GenuineImpostor Correct0.75 ± Wrong ±0.18 Total 11

ROC Curve Q1 Pleasant Easy Q2 Pleasant Difficult Q3 Recent Easy, Q4 Recent Difficult Q5 Repeat EasyQ6 Repeated Difficult, Q7 Multiple-ChoiceQ8 Multiple Choice VariablesAUC Q Q Q31 Q Q50.75 Q Q70.75 Q80.75

Conclusions The pilot study showed feasibility of this novel idea. Surprising results that person can’t remember his calendar The recent, repetitive, pleasant question types are better remembered and these types need further investigations in a bigger experiment. In the reality, information will not be shared usually population is random people which gives the idea more creditability.

Future Work Implementation Model Additional Information

Trusted Third Party (TTP) Mitchell, 2004 summarized authentication stages for SSO or certificate into two major : A.the initial authentication stage B.authentication at instant time stage

TTP

Question Based-Model Question /Answer Authentication Electronic Personal History e.g. pay-pal on e-bay

Future Work

The research can go further and use other electronic data such as data stored on mobile phone (E911) legislation, GPS, PC, government or organizations database and, in the future with the smart environment application, there will a huge amount of stored electronic personal data. This large bulk of information can provide better security and, at the same time, will provide users with mobility because it is memorable. more investigation is required to gain more confidence in the results

Thank you