Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics

We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power along with the ability to gauge the users' task familiarity,...

Full description

Bibliographic Details
Main Authors: Eberz, S, Rasmussen, K, Lenders, V, Martinovic, I
Format: Conference item
Published: 2015
_version_ 1826277938747670528
author Eberz, S
Rasmussen, K
Lenders, V
Martinovic, I
author_facet Eberz, S
Rasmussen, K
Lenders, V
Martinovic, I
author_sort Eberz, S
collection OXFORD
description We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power along with the ability to gauge the users' task familiarity, i.e., level of knowledge, to address insider threats. In a controlled experiment we test how both time and task familiarity influence eye movements and feature stability, and how different subsets of features affect the classifier performance. These feature subsets can be used to tailor the eye movement biometric to different authentication methods and threat models. Our results show that eye movement biometrics support reliable and stable identification and authentication of users. We investigate different approaches in which an attacker could attempt to use inside knowledge to mimic the legitimate user. Our results show that while this advance knowledge is measurable, it does not increase the likelihood of successful impersonation. In order to determine the time stability of our features we repeat the experiment twice within two weeks. The results indicate that we can reliably authenticate users over the entire period. We show that the classification decision depends on all features and mimicking a few of them will not be sufficient to trick the classifier. We discuss the advantages and limitations of our approach in detail and give practical insights on the use of this biometric in a real-world environment.
first_indexed 2024-03-06T23:36:26Z
format Conference item
id oxford-uuid:6dd4bf7a-be17-4048-ac5b-7d4447c004e9
institution University of Oxford
last_indexed 2024-03-06T23:36:26Z
publishDate 2015
record_format dspace
spelling oxford-uuid:6dd4bf7a-be17-4048-ac5b-7d4447c004e92022-03-26T19:20:18ZPreventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement BiometricsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:6dd4bf7a-be17-4048-ac5b-7d4447c004e9Department of Computer Science2015Eberz, SRasmussen, KLenders, VMartinovic, IWe introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 21 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power along with the ability to gauge the users' task familiarity, i.e., level of knowledge, to address insider threats. In a controlled experiment we test how both time and task familiarity influence eye movements and feature stability, and how different subsets of features affect the classifier performance. These feature subsets can be used to tailor the eye movement biometric to different authentication methods and threat models. Our results show that eye movement biometrics support reliable and stable identification and authentication of users. We investigate different approaches in which an attacker could attempt to use inside knowledge to mimic the legitimate user. Our results show that while this advance knowledge is measurable, it does not increase the likelihood of successful impersonation. In order to determine the time stability of our features we repeat the experiment twice within two weeks. The results indicate that we can reliably authenticate users over the entire period. We show that the classification decision depends on all features and mimicking a few of them will not be sufficient to trick the classifier. We discuss the advantages and limitations of our approach in detail and give practical insights on the use of this biometric in a real-world environment.
spellingShingle Eberz, S
Rasmussen, K
Lenders, V
Martinovic, I
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
title Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
title_full Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
title_fullStr Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
title_full_unstemmed Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
title_short Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
title_sort preventing lunchtime attacks fighting insider threats with eye movement biometrics
work_keys_str_mv AT eberzs preventinglunchtimeattacksfightinginsiderthreatswitheyemovementbiometrics
AT rasmussenk preventinglunchtimeattacksfightinginsiderthreatswitheyemovementbiometrics
AT lendersv preventinglunchtimeattacksfightinginsiderthreatswitheyemovementbiometrics
AT martinovici preventinglunchtimeattacksfightinginsiderthreatswitheyemovementbiometrics