Você está na página 1de 2

Known User Continuous Authentication System

Ines Brosso
1
Fernando Ferreira
2

College of Computation and Informatics,
Mackenzie Presbyterian University,
Sao Paulo, Brazil
inesbrosso@mackenzie.br
1
fer.henrique@gmail.com
2


Graa Bressan
3
Wilson V Ruggiero
4


Laboratory of Computer Architecture and Networks,
Department of Computer and Digital System Engineering,
Polytechnic School of So Paulo University, Brazil
gbressan@larc.usp.br
3
ruggiero@larc.usp.br
4


Abstract This work presents KUCAS (Known User Continuous
Authentication System), a work-in-progress security system, that has
a continuous authentication mechanism of users in software
application. The KUCAS system makes use of environmental context
information, users behavior analysis, the behavior theories of Skinner
and the Mathematical Confidence of Dempster-Shafer Evidences
Theory, that establishes trust levels to authenticate the user by his
behavior analysis, during an application software, in a specific
domain of the computer networks, in a period of time. The dynamics
of enclosed management in this system compares the current
behavior with the users previous behaviors description and with the
trust restrictions. In case of indications of changes in the users
behavior, the system provides the behavior analysis of the user using
database restrictions information. If there are uncertainties and
divergences, mechanisms of security and alert signals are triggered.
Keywords-component: Security and Content Protection,
Pervasive and Ambient Applications Computer, Access control,
Continuous Authentication Process, Behavioral science, Adaptative
Security Policy.
I. THE KUCAS SYSTEM
KUCAS (Known User Continuous Authentication System)
is a security system that has a continuous authentication
mechanism of users [1]. A continuous authentication of the
user in an application software is extremely important and a
complement to the initial authentication. KUCAS System
extracts behavioral information of users, in the environment,
using context-aware computing. The human behavior is based
on contextual information, based on previous behavioral
history, previous history of reinforcement of behavior and
conduct of the person to immediately interact with the
environment. The key concept of the thinking of Skinner's
behavior is operant conditioning that is a mechanism that
rewards a response of an individual until he is conditioned to
associate the need for action [4]. The human behavior is
uncertain and complex, defying the attempts of analysis, for
this should be based on rigorous methods of isolation of
variables. The scientific analysis of the human behavior starts
in the knowledge and isolation of the parts of an event, to
determine the characteristics and the dimensions of the
occasion where the behavior occurs, and to define the changes
produced in answers to the environment, space, time and
opportunities. Thus, it can be said that the environment, the
virtual space and the physical space establish the conditions to
occur a behavior. When the organism answers to an
environmental stimulation and the consequences of its reply
are awardees, this makes the probability of similar answers
increase; when the consequences are punitive, diminish such
probability. It is in this way, the environmental variables
model the behavior of the users, in a conditioning process. In
analogous way, during a software application session, the user
behavior is conditioned when interacting with an electro-
electronic device and the software application. The user will
associate the situations occurred with other similar,
generalizing this learning to a larger context of life. This may
be considered in the context of an authentication system and
the security aspects. KUCAS system has two different types of
authentication: 1. Initial Authentication: the person informs
the access code and password which will be used for accessing
the software applications. 2. Continuous authentication:
ensuring the authenticity of the person during the
communication and over-application processing software, the
system verifies the databases periodically, without the
necessity for confirmation of the authentication, everything is
done so ubiquitously, an authentication which extends
continuously over the time interval in which the user interacts
with the application software. The KUCAS System has an
infrastructure composed by one framework (F-KUCAS), a
Security Module (S-KUCAS) and an Algorithm of Continuous
Authentication (A-KUCAS) that analyzes the user behavior
and give him the trust level. The user accesses a software
application in the wired or wireless network, the system is
activated and KUCAS capture the user behavior information
in the environment through the F-KUCAS framework, which
triggers the algorithm A-KUCAS and the security module S -
KUCAS; with the increase of user interaction with the
environment, the KUCAS system will varying the initial level
of trust attributed to the user [3, 4]. The KUCAS system has
three distinct stages: 1stage - to capture the information of the
user behavior in the environment, 2stage - to analyze the user
behavior, 3stage to increment/decrement the trust. The
capture of user behavioral information in the environment is
done from the time when the user is identified and accesses a
software application to the time when he closes it. The
information obtained is the evidence of user behavior. The
process of continuous authentication is done by The KUCAS
System that capture the environment context information
using the contextual dimensions {who, where, when, what}
defined by the Context-aware Computing and a variable called
rest that represents the behavioral restrictions for a user.

978-1-4244-5176-0/10/$26.00 2010 IEEE
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings

Figure 1: The KUCAS Implementation

At the first moment, the user is identified by the KUCAS
system that starts a behavioral analysis of the user in a
software application session using the trust. The trust, the
concept that we humans use to give trust or not to a person is
based in the behavior and in the reputation. The trust in a
person is not the dichotomy of trust or not, it is dimensional
and it can be measured. For this, KUCAS System stipulates
trust levels based in the behavioral analysis of the user and in
the trust restrictions generated by the user. Along the time and
in accordance with the behavior analysis, the user trust level
can suffer variations, and thus, KUCAS System interacts with
the user and determines evidences to increase or to decrease
the trust in the user. The measures of trust and distrust are so
mutually dual and therefore, the measure of distrust can also
be defined as independent of the measure of trust. With the
time passing and in accordance with the behavior analysis, the
trust level in the user can suffer variations, and thus, KUCAS
System interacts with the user and it determines evidences to
increase or to decrease the trust in the user. Trust is based in
two not complementary measures: Confidence is an abstract
concept that shows a belief in the sincerity / authenticity of a
person in another person. Given the uncertainty and doubt, it is
often necessary to take decisions based on evidences, which
are not always accurate. The heuristic to define the initial trust
value is determined by a model based on the user behavior, his
activity at the moment, his localization, the schedule where the
current behavior occurs and the user behavior description. The
KUCAS system is being validated with successful tests and
simulations to continuous authenticate a user identity in
Internet banking and to protect financial information
resources.
The KUCAS System, based on the evidences of the
behavior, establishes if it trusts or not in the user and the
behavior analysis reflects the personality of the user/consumer,
even in a conditioned environment. The KUCAS System
preserves the privacy of the consumer and it is possible to
define adaptive security policy, based on behavioral analysis
of user in computers networks.



II. THE DEMONSTRATION OF KUCAS


Figure 2: Using KUCAS in Internet Banking Application

The Figure 2 shows KUCAS applied in a software
application to access a bank account via Internet Banking or
Mobile Banking with the following variables: who={Bank
Account and Password (Security Key)}, where= {Place or IP
of computer}, when={Date and Time using Internet banking},
what={type of application (payment, transfer of money or
financial investment} and the variable rest= {set of the
behavioral restrictions for a user in Internet Banking}.


Figure 3: KUCAS Presentation

Figure 3 shows how KUCAS can be demonstrated or used
in a place without using Internet.
III. REFERENCES
[1] Brosso, I.; Bressan, G.; Ruggiero, W. V. - The Continuous
Authentication - 22nd IEEE Computer Security Foundations Symposium
(CSF 2009), Short Talks Session, July 8-10, Port Jefferson, New York,
USA, ( 2009).
[2] Dempster, A. P. -Upper and Lower Probabilities Induced by a Multi-
valued Mapping, Annals of Mathematical Statistics, Vol.38, pp.325-339,
(1967).
[3] Shaffer, G. A Mathemathical Theory of Evidence. Princeton, Princeton
University Press, (1976).
[4] Skinner, B. F. Cincia e Comportamento Humano. So Paulo:
Ed.Martins Fontes, (2003).
[5] Calderon, T.G., Chandra, Akhilesh and Cheh, John J. - Modeling an
intelligent continuous authentication system to protect financial
information resources- International Journal of Accounting Information
Systems, Volume 7, Issue 2, Pages 91-109, June (2006).
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings

Você também pode gostar