Abstract
In this research, we introduce the concept of adversary identification in combination with continuous authentication. To protect the system from session hijacking, it is important to not only use the traditional access control at the beginning of a session but also continuously monitor the entire session whether the present user is still the legitimate user or not. In case an impostor is detected, the system should lock to avoid loss or disclosure of personal or confidential information. In many cases, it will be important to not only secure the system but also establish the identity of the impostor which could be seen as a deterrence measure or could be used as a shred of evidence in the court. This concept has not been introduced in this manner before, and it combines security and forensics continuously.We have performed a closed-set and an open-set experiment to validate our proof of concept with two different publicly available mobile biometrics datasets. Depending upon the dataset and used settings, we show that the adversary can be correctly identified with 82.2% to 97.9% of the attack cases for closed-set experiment and for the open-set experiment this performance ranges from 73.8% to 77.6%.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.