Continuous and Non-Intrusive Reauthentication of Web Sessions based on Mouse Dynamics Eric Medvet

Alberto Bartoli

Francesca Boem

Fabiano Tarlao

Department of Engineering and Architecture University of Trieste Italy

September 10th, 2014

http://machinelearning.inginf.units.it

Scenario and motivation

Table of Contents

1

Scenario and motivation

2

Our contribution Data capture system Reauthentication by mouse dynamics

3

Experimental evaluation Dataset Results

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

2 / 22

Scenario and motivation

(Re)Authentication

Credentials stealing is not an exceptional event bad current user with good credentials, possibly for a long time

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

3 / 22

Scenario and motivation

(Re)Authentication

Credentials stealing is not an exceptional event bad current user with good credentials, possibly for a long time → verify the user identity over the time

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

3 / 22

Scenario and motivation

(Re)Authentication

Credentials stealing is not an exceptional event bad current user with good credentials, possibly for a long time → verify the user identity over the time by other means than credentials possibly non-intrusively

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

3 / 22

Scenario and motivation

Behavioral biometrics

Non-intrusive continuous verification of the user identity → Behavioral biometrics: keystrokes ... mouse trajectories

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

4 / 22

Scenario and motivation

Behavioral biometrics

Non-intrusive continuous verification of the user identity → Behavioral biometrics: keystrokes ... mouse trajectories

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

4 / 22

Scenario and motivation

Behavioral biometrics

Non-intrusive continuous verification of the user identity → Behavioral biometrics: keystrokes ... mouse trajectories Machine instrumentation for collecting biometrics may be unpractical for large distributed organizations

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

4 / 22

Scenario and motivation

Scenario

So, we are concerned in: continuous reauthentication using mouse dynamics collected w/o specific software installed on client machine

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

5 / 22

Scenario and motivation

Scenario

We chose to address: web full transparency to server and client Suitable for: large organizations w/ user web access (private) cloud hosted enterprise applications

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

6 / 22

Scenario and motivation

Example

Large organizations w/ user web access:

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Scenario and motivation

Example

Large organizations w/ user web access: 1

X authenticates with Alice’s credentials on her organization

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Scenario and motivation

Example

Large organizations w/ user web access: 1

X authenticates with Alice’s credentials on her organization

2

X browses the web (any website) and. . .

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Scenario and motivation

Example

Large organizations w/ user web access: 1

X authenticates with Alice’s credentials on her organization

2

X browses the web (any website) and. . .

3

. . . if X ’s behaviour is different enough from Alice’s known behavior, an alert is eventually raised

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Scenario and motivation

Example

Large organizations w/ user web access: 1

X authenticates with Alice’s credentials on her organization

2

X browses the web (any website) and. . .

3

. . . if X ’s behaviour is different enough from Alice’s known behavior, an alert is eventually raised

Authentication

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Scenario and motivation

Example

Large organizations w/ user web access: 1

X authenticates with Alice’s credentials on her organization

2

X browses the web (any website) and. . .

3

. . . if X ’s behaviour is different enough from Alice’s known behavior, an alert is eventually raised

Authentication, then reauthentication in the web using mouse dynamics.

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Scenario and motivation

Example

Large organizations w/ user web access: 1

X authenticates with Alice’s credentials on her organization

2

X browses the web (any website) and. . .

3

. . . if X ’s behaviour is different enough from Alice’s known behavior, an alert is eventually raised

Authentication, then reauthentication in the web using mouse dynamics. Aim at detecting long lasting systematic fraudulent account usage (defense-in-depth).

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

7 / 22

Our contribution

Table of Contents

1

Scenario and motivation

2

Our contribution Data capture system Reauthentication by mouse dynamics

3

Experimental evaluation Dataset Results

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

8 / 22

Our contribution

Our contribution

In a nutshell: a system for capturing web GUI-related events transparent for user and web site a procedure for performing continuous reauthentication using mouse-generated events

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

9 / 22

Our contribution

Data capture system

Data capture system: overview

a web proxy a js (collects data) a web app (receives and analyzes data)

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

10 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

1

C requests HTML document to S, S responds with d

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

1 2

C requests HTML document to S, S responds with d P injects in d our js URL (src="/obs/observer.js")

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

1 2 3

C requests HTML document to S, S responds with d P injects in d our js URL (src="/obs/observer.js") C requests resources mentioned in d js

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

1 2 3

C requests HTML document to S, S responds with d P injects in d our js URL (src="/obs/observer.js") C requests resources mentioned in d js : our js comes from O (rather than S) via P

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

How it works GET GET /img/img.png /index.html

Browser C open on d js

GET /obs/observer.js POST /obs js

d

Proxy P

d

Web server S

Web app O

1 2 3

4

C requests HTML document to S, S responds with d P injects in d our js URL (src="/obs/observer.js") C requests resources mentioned in d js : our js comes from O (rather than S) via P our js on C sends mouse events data to /obs, i.e., O

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

11 / 22

Our contribution

Data capture system

Data capture system

fully transparent to both user and web sites, requires only to set the proxy redirection of /obs/* traffic allows to circumvent Same Origin Policy low bandwidth usage (≈ 2.5 kB s−1 ) can work with HTTPS (w/ self-signed certificate)

1

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

12 / 22

Our contribution

Data capture system

Data capture system

fully transparent to both user and web sites, requires only to set the proxy redirection of /obs/* traffic allows to circumvent Same Origin Policy low bandwidth usage (≈ 2.5 kB s−1 ) can work with HTTPS (w/ self-signed certificate) could be used also for other purposes: web app testing1 , web app misuse detection, . . .

1 Bartoli, Medvet, Mauri, Recording and Replaying Navigations on AJAX Web Sites, Int. Conf. on Web Engineering (ICWE), 2012 Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

12 / 22

Our contribution

Reauthentication by mouse dynamics

Procedure: overview

Data capture system generates an event e = (x, y , t) every ≈ 25 ms, then we: 1

split sequence of events on pauses ≥ 500 ms and consider the last 10 events before a pause (trajectory)

2

transform a trajectory T into a vector f(T ) ∈ R39

3

classify f(T ) as anomalous/normal, w.r.t. current authenticated user

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

13 / 22

Our contribution

Reauthentication by mouse dynamics

Features

f(T ) includes: directions and direction changes speeds accelerations x- and y -extents

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

14 / 22

Our contribution

Reauthentication by mouse dynamics

Classification

Two phases: training actual classification

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

15 / 22

Our contribution

Reauthentication by mouse dynamics

Classification

Two phases: (U − is the authenticated user) training based on trajectories of U − and other users U1+ , U2+ , . . . actual classification

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

15 / 22

Our contribution

Reauthentication by mouse dynamics

Classification

Two phases: (U − is the authenticated user) training based on trajectories of U − and other users U1+ , U2+ , . . . actual classification based on trajectories of current unknown user U claiming to be U −

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

15 / 22

Our contribution

Reauthentication by mouse dynamics

Training phase

Once, at the beginning: 1

train a SVMU − on the training set

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

16 / 22

Our contribution

Reauthentication by mouse dynamics

Actual classification phase

For each T trajectory of U: 1

apply SVMU − to f(T )

2

consider last w trajectories and. . .

3

. . . if too many positives, raise an alert

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

17 / 22

Our contribution

Reauthentication by mouse dynamics

Last w trajectories

Aggregation of several classifier outcomes: often used with mouse dynamics the higher w , the higher the accuracy and the longer the Time to Detection (TtD)

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

18 / 22

Experimental evaluation

Table of Contents

1

Scenario and motivation

2

Our contribution Data capture system Reauthentication by mouse dynamics

3

Experimental evaluation Dataset Results

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

19 / 22

Experimental evaluation

Dataset

Dataset

Two groups of users, each observed for several working days: 6 users, with different hardware equipment 18 users, with homogeneous hardware

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

20 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Medvet, Bartoli, Boem, Tarlao (UniTs)

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

Web Reauthentication by Mouse Dynamics

2 FRR 25.4 19.6 13.3 8.0 6.1

September 10th, 2014

21 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

2 FRR 25.4 19.6 13.3 8.0 6.1

accuracy up to 96%

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

21 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

2 FRR 25.4 19.6 13.3 8.0 6.1

accuracy up to 96% works better if attacker uses different hardware

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

21 / 22

Experimental evaluation

Results

Results

w 50 100 200 350 500

TtD (min) 13.5 27.1 54.1 94.7 135.3

Dataset Acc. FAR 83.3 16.6 88.5 12.8 93.5 9.2 95.6 7.9 96.5 6.1

1 FRR 16.7 10.2 3.8 1.0 0.8

Dataset Acc. FAR 76.4 21.8 81.4 17.5 86.6 13.5 90.6 10.8 92.2 9.5

2 FRR 25.4 19.6 13.3 8.0 6.1

accuracy up to 96% works better if attacker uses different hardware time to detection of tens of minutes

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

21 / 22

Experimental evaluation

Results

Time to detection

Time to detection of tens of minutes: is it practical? fits the threat model we can only monitor web usage (browser) user could unfocus the browser for minutes we consider sessions without pauses ≥ 10 minutes

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

22 / 22

Experimental evaluation

Results

Thanks!

Medvet, Bartoli, Boem, Tarlao (UniTs)

Web Reauthentication by Mouse Dynamics

September 10th, 2014

22 / 22

Continuous and Non-Intrusive Reauthentication of Web ...

Sep 10, 2014 - (private) cloud hosted enterprise applications. Medvet, Bartoli ..... Data capture system generates an event e = (x,y,t) every ≈ 25 ms, then we: 1.

282KB Sizes 0 Downloads 107 Views

Recommend Documents

Continuous and Non-intrusive Reauthentication of Web Sessions ...
the existing infrastructure of large organizations. We assess our proposal with real data from 24 users, collected during normal working activity for several ...

Continuous and Non-intrusive Reauthentication of Web Sessions ...
proposals requiring instrumentation of client workstations for intercepting all mouse activity—quite a strong require- ment for large organizations. Our proposal ...

Securing Nonintrusive Web Encryption through ... - Research at Google
Jun 8, 2008 - generated data with business partners and/or have vulnerabilities that may lead to ... risks and send confidential data to untrusted sites in order to use .... applications involving multiple websites, as shown in Section 3.3. In Sweb,

Importance of Maintaining Continuous Errors and Omissions ...
Importance of Maintaining Continuous Errors and Omissions Coverage Bulletin.pdf. Importance of Maintaining Continuous Errors and Omissions Coverage ...

Various continuous harmony search algorithms for web ...
and power economic utilisation (Vasebi et al., 2007), offshore oil structure mooring ( ..... search', Proceedings of the 26th International Conference on Offshore ...

Invitation to Bid - Procurement of Supplies and Materials, Continuous ...
Invitation to Bid - Procurement of Supplies and Mate ... ontinuous Forms for 3 months consumption of RPSU.pdf. Invitation to Bid - Procurement of Supplies and ...

Photon: fault-tolerant and scalable joining of continuous ... - CiteSeerX
Wide Web in the last several years, the need for similar tech- nologies has ... Figure 1: Joining query and click events in Photon click event is .... high degree of fault-tolerance that can automatically ...... Computer Science Technical Reports,.

Photon: Fault-tolerant and Scalable Joining of Continuous ... - People
in near real-time has a huge impact on business processes. The data ... identifier, ad text, and online ad auction parameters. ..... return success to the dispatcher.

Photon: fault-tolerant and scalable joining of continuous ... - CiteSeerX
in maintaining large persistent state across geographically .... To the best of our knowledge, this is the first paper ...... cal state through resharding of IdRegistry.

Photon: Fault-tolerant and Scalable Joining of Continuous ... - People
numerous applications (e.g. IP network management, tele- ... in near real-time has a huge impact on business processes. The data ... identifier, ad text, and online ad auction parameters. .... high degree of fault-tolerance that can automatically.

Violation of Continuous-Variable Einstein ... - Semantic Scholar
3Rochester Theory Center, University of Rochester, Rochester, New York 14627, USA. (Received 13 ... local realism in the EPR paradox [2], a task whose diffi- culty grows .... of entanglement (which we call symmetric EPR steering) sufficient to ...

mStress: Supporting Continuous Collection of ... - Semantic Scholar
All of this functionality occurs entirely on the mobile phone without any help .... a call from the boss when at home leads to excessive stress. [11]. Last, but not ...