PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Uniqueness and Reproducibility of Trac Signatures

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Usable user authentication is an important research topic. The traffic signature-based approach is a new authentication technology that identifies the devices used by online users based on traffic signatures, where the traffic approach has two advantages. First, users need not do any operations regarding the device identification. Second, users need not be sensitive to the privacy loss and computer theft. In this paper, an author evaluates the uniqueness and reproducibility of the signature by introducing a function that quantifies the distance between two signatures. Through number of experiments is demonstrated that the process interference approach has the advantage of generating new signatures that are sufficiently distinguishable from one another.
Rocznik
Tom
Strony
44--53
Opis fizyczny
Bibliogr. 22 poz., rys., tab.
Twórcy
autor
  • Department of Computer Science and Engineering, Fukuoka Institute of Technology, Fukuoka, Japan
Bibliografia
  • [1] R. P. Guidorizzi, "Security: Active authentication", IT Professional, vol. 15, no. 4, pp. 4-7, 2013.
  • [2] Federal Financial Institutions Examination Council, "Authentication in an internet banking environment", 2005 [Online]. Available: http://www._ec.gov/pdf/authentication guidance.pdf
  • [3] M. Jakobsson, R. Chow, and J. Molina, "Authentication - are we doing well enough? [guest editors' introduction]", IEEE Secur. & Priv., vol. 10, no. 1, pp. 19-21, 2012.
  • [4] D. DeFigueiredo, "The case for mobile two-factor authentication", IEEE Securi. & Priv., vol. 9, no. 5, pp. 81-85, 2011.
  • [5] M. Sasse and C. C. Palmer, "Protecting you" [guest editors' introduction], IEEE Secur. & Priv., vol. 12, no. 1, pp. 11-13, 2014.
  • [6] C. Herley, "More is not the answer", IEEE Secur. & Priv., vol. 12, no. 1, pp. 14-19, 2014.
  • [7] K. Oida, "A traffic signature sensitive to client machines", in Proc. Int. Conf. Adv. Comp. Inform. Technol. ACIT'13, Kuala Lumpur, Malaysia, 2013.
  • [8] E. De Cristofaro, H. Du, J. Freudiger, and G. Norcie, Two-factor or not two-factor? A comparative usability study of two-factor authentication", Computing Research Repository, 2013.
  • [9] K. Oida, "Video traffic attributes for end host identification", Int. J. Comp. Commun. Engin., vol. 1, no. 4, pp. 396-401, 2012.
  • [10] Trusted Computing Group, "Trusted platform module (TPM) summary", July 2009 [Online]. Available: http://www.trustedcomputinggroup.org/resources/trusted platform module tpm summary
  • [11] O. Oyman and S. Singh, "Quality of experience for http adaptive streaming services", IEEE Commun. Mag., vol. 50, no. 4, pp. 20-27, 2012.
  • [12] J. Beran, Statistics for Long-Memory Processes. Chapman & Hall/CRC Press, 1994, vol. 61.
  • [13] WinDump [Online]. Available: http://www.winpcap.org/windump/
  • [14] T. Weigold, T. Kramp, and M. Baentsch, "Remote client authentication", IEEE Secur. & Priv., vol. 6, no. 4, pp. 0036-43, 2008.
  • [15] tcpdump [Online]. Available: http://www.tcpdump.org/
  • [16] F. Risso and L. Degioanni, "An architecture for high performance network analysis", in Proc. 6th IEEE Symp. Comp. & Commun. ISCC 2001, Hammamet, Tunisia, 2001, pp. 686-693.
  • [17] VLC media player [Online]. Available: http://www.videolan.org/vlc/
  • [18] L. Degioanni, M. Baldi, F. Risso, and G. Varenni, "Profiling and optimization of software-based network-analysis applications", in Proc. 15th IEEE Symp. Comp. Architec. & High Perform. Comput. SBAC-PAD'03, São Paulo, Brazil, 2003, pp. 226-234.
  • [19] P. Orosz and T. Skopko, "Performance evaluation of a high precision software-based timestamping solution for network monitoring", Int. J. Adv. Softw., vol. 4, no. 1 and 2, pp. 181-188, 2011.
  • [20] G. Varenni, M. Baldi, L. Degioanni, and F. Risso, "Optimizing packet capture on symmetric multiprocessing machines", in Proc. 15th IEEE Symp. Comp. Architec. & High Perform. Comput. SBAC-PAD'03, São Paulo, Brazil, 2003, pp. 108-115.
  • [21] M. Carbone and L. Rizzo, "Dummynet revisited", ACM SIGCOMM Comp. Commun. Rev., vol. 40, no. 2, pp. 12-20, 2010.
  • [22] V. Jacobson et al., "TCP extensions for high performance", IETF, RFC 1323, May 1992 [Online]. Available: www.ietf.org/rfc/rfc1323.txt
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ce46481e-671d-4c7b-bd96-517e2c732eed
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.