Continuous and Non-Intrusive Reauthentication of Web ... - Google Sites

0 downloads 84 Views 282KB Size Report
Sep 10, 2014 - (private) cloud hosted enterprise applications. Medvet, Bartoli ..... Data capture system generates an ev
Continuous and Non-Intrusive Reauthentication of Web Sessions based on Mouse Dynamics Eric Medvet

Alberto Bartoli

Francesca Boem

Fabiano Tarlao

Department of Engineering and Architecture University of Trieste Italy

September 10th, 2014

http://machinelearning.inginf.units.it

Scenario and motivation

Table of Contents

1

Scenario and motivation

2

Our contribution )

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

) C requests resources mentioned in d js

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

) C requests resources mentioned in d js : our js comes from O (rather than S) via P

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

) C requests resources mentioned in d js : our js comes from O (rather than S) via P our js on C sends mouse events data to /obs, i.e., O

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

Data capture system

fully transparent to both user and web sites, requires only to set the proxy redirection of /obs/* traffic allows to circumvent Same Origin Policy low bandwidth usage (≈ 2.5 kB s−1 ) can work with HTTPS (w/ self-signed certificate)

1

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

12 / 22

Our contribution

Data capture system

Data capture system

fully transparent to both user and web sites, requires only to set the proxy redirection of /obs/* traffic allows to circumvent Same Origin Policy low bandwidth usage (≈ 2.5 kB s−1 ) can work with HTTPS (w/ self-signed certificate) could be used also for other purposes: web app testing1 , web app misuse detection, . . .

1 Bartoli, Medvet, Mauri, Recording and Replaying Navigations on AJAX Web Sites, Int. Conf. on Web Engineering (ICWE), 2012 Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

12 / 22

Our contribution

Reauthentication by mouse dynamics

Procedure: overview

Data capture system generates an event e = (x, y , t) every ≈ 25 ms, then we: 1

split sequence of events on pauses ≥ 500 ms and consider the last 10 events before a pause (trajectory)

2

transform a trajectory T into a vector f(T ) ∈ R39

3

classify f(T ) as anomalous/normal, w.r.t. current authenticated user

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

13 / 22

Our contribution

Reauthentication by mouse dynamics

Features

f(T ) includes: directions and direction changes speeds accelerations x- and y -extents

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

14 / 22

Our contribution

Reauthentication by mouse dynamics

Classification

Two phases: training actual classification

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

15 / 22

Our contribution

Reauthentication by mouse dynamics

Classification

Two phases: (U − is the authenticated user) training based on trajectories of U − and other users U1+ , U2+ , . . . actual classification

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

15 / 22

Our contribution

Reauthentication by mouse dynamics

Classification

Two phases: (U − is the authenticated user) training based on trajectories of U − and other users U1+ , U2+ , . . . actual classification based on trajectories of current unknown user U claiming to be U −

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

15 / 22

Our contribution

Reauthentication by mouse dynamics

Training phase

Once, at the beginning: 1

train a SVMU − on the training set

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

16 / 22

Our contribution

Reauthentication by mouse dynamics

Actual classification phase

For each T trajectory of U: 1

apply SVMU − to f(T )

2

consider last w trajectories and. . .

3

. . . if too many positives, raise an alert

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

17 / 22

Our contribution

Reauthentication by mouse dynamics

Last w trajectories

Aggregation of several classifier outcomes: often used with mouse dynamics the higher w , the higher the accuracy and the longer the Time to Detection (TtD)

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

18 / 22

Experimental evaluation

Table of Contents

1

Scenario and motivation

2

Our contribution Data capture system Reauthentication by mouse dynamics

3

Experimental evaluation Dataset Results

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

19 / 22

Experimental evaluation

Dataset

Dataset

Two groups of users, each observed for several working days: 6 users, with different hardware equipment 18 users, with homogeneous hardware

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

20 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Medvet, Bartoli, Boem, Tarlao (UniTs)

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

Web Reauthentication by Mouse Dynamics

2 FRR 25.4 19.6 13.3 8.0 6.1

September 10th, 2014

21 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

2 FRR 25.4 19.6 13.3 8.0 6.1

accuracy up to 96%

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

21 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

2 FRR 25.4 19.6 13.3 8.0 6.1

accuracy up to 96% works better if attacker uses different hardware

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

21 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

2 FRR 25.4 19.6 13.3 8.0 6.1

accuracy up to 96% works better if attacker uses different hardware time to detection of tens of minutes

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

21 / 22

Experimental evaluation

Results

Time to detection

Time to detection of tens of minutes: is it practical? fits the threat model we can only monitor web usage (browser) user could unfocus the browser for minutes we consider sessions without pauses ≥ 10 minutes

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

22 / 22

Experimental evaluation

Results

Thanks!

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

22 / 22

Suggest Documents