Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach


Saritas S., Shereen E., Sandberg H., Dan G.

10th International Conference on Decision and Game Theory for Security (GameSec), Stockholm, İsveç, 30 Ekim - 01 Kasım 2019, cilt.11836, ss.439-458 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası: 11836
  • Doi Numarası: 10.1007/978-3-030-32430-8_26
  • Basıldığı Şehir: Stockholm
  • Basıldığı Ülke: İsveç
  • Sayfa Sayıları: ss.439-458
  • Anahtar Kelimeler: Continuous authentication, Dynamic stochastic game, Markov decision process
  • Orta Doğu Teknik Üniversitesi Adresli: Hayır

Özet

Identity theft through phishing and session hijacking attacks has become a major attack vector in recent years, and is expected to become more frequent due to the pervasive use of mobile devices. Continuous authentication based on the characterization of user behavior, both in terms of user interaction patterns and usage patterns, is emerging as an effective solution for mitigating identity theft, and could become an important component of defense-in-depth strategies in cyber-physical systems as well. In this paper, the interaction between an attacker and an operator using continuous authentication is modeled as a stochastic game. In the model, the attacker observes and learns the behavioral patterns of an authorized user whom it aims at impersonating, whereas the operator designs the security measures to detect suspicious behavior and to prevent unauthorized access while minimizing the monitoring expenses. It is shown that the optimal attacker strategy exhibits a threshold structure, and consists of observing the user behavior to collect information at the beginning, and then attacking (rather than observing) after gathering enough data. From the operator's side, the optimal design of the security measures is provided. Numerical results are used to illustrate the intrinsic trade-off between monitoring cost and security risk, and show that continuous authentication can be effective in minimizing security risk.