Sunday, January 17, 2021

Importance of post-authentication intruder detection systems in mobile and computer security



There are billions of mobile phones and computers in use globally. The value of these devices cannot be measured only by their retail price. They hold invaluable data of individuals, organizations, military, and governments. Therefore, the security of these devices should not be limited to authentication and authorization mechanism. Post authentication techniques to detect intruders are an absolute necessity in these systems.


Some of the frequently used authentication mechanisms are passwords or a PIN, fingerprints, or face recognition. however, attackers have already found loopholes in these mechanisms and these devices remain vulnerable to intruders. Attackers are often capable of cracking passwords and pins by brute force attacks, social engineering techniques, or by just simply shoulder surfing. It has proven multiple times that a mare scotch tape or lipstick can be used to recreate a fingerprint and bypass the authentication. Furthermore, Face recognition is proven to be bypassed by 3D printed masks or deep fakes. Besides these authentication mechanisms have little to do in case of a remote access attack. In addition, the main contributing factor for these systems being vulnerable regardless of a strong authentication mechanism is the Human Error. It is founded in an IBM study that 95% of the time Human Error is the main reason for security breaches. In most cases it is due to users of these systems does not fully comprehend the value or the importance of these security measures. On the other hand, people tend to completely ignore the authentication mechanisms and remove these security options due to its requirement of continuous user input every time a user logs in.

By using multiple authentication mechanisms and combinations of what user know or have with biometric identification, can mitigate the risk of an intruder attack up to some level. However, as stated above these mechanisms are bypassable. Anti-spyware and virus guards can be installed on these devices in case of a remote access attack. Furthermore, conducting awareness programs and educating people on social engineering attacks and the importance of currently available security measures is effective as well. However, regardless of these detection, prevention, and mitigation methods, frequent data intrusion attacks leading to data breaches can be seen in these devices.

A much suitable solution for this problem would be a post-authentication mechanism to detect an intruder. My bachelor's research was based on this concept and me and my team researched intruder detection through user behavior on mobile devices. Patterns of user behavior such as keystroke dynamics, Application usage, and geolocation details can be used to differentiate normal from anomalous behavior. The same concept can be applied to computer systems as well. A training period should be given to the behavioral analysis system to collect data and train the algorithms. Thereafter the process would run in the background monitoring the user behavior continuously and would not interrupt a user other than when an anomaly is detected. In the case of such an incident, the data of the device can be encrypted automatically. By using this mechanism users would not be interrupted or have to provide any input. Even though an attacker could bypass the authentication mechanisms, the device would still be able to detect irregular behavior. Monitoring user behavior patterns would also be useful in remote access attacks as well.

This system would need both high storage capacity and processing power in the devices. Therefore partial installation should be done in a cloud platform that can store and process the collected data. This post-authentication intrusion detection system is proposed to embed as an inbuilt application in computer and mobile devices.

References

Chandrasekara P., Abeywardana H., Rajapaksha S., Parameshwaran S., Yapa Abeywardana K. (2020) Behavior and Biometrics Based Masquerade Detection Mobile Application. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_32

No comments:

Post a Comment

Review of California Consumer Privacy Act (CCPA) and the amendment of California Privacy Rights Act (CPRA)

California Consumer Privacy Act (CCPA) became effective on 1st of January 2020 enhancing the privacy rights and consumer protection for the ...