Abstract
Recently, a new class of USB based attacks has emerged which unlike previous USB based threats does not exploit any vulnerability or depend on any operating system feature. The USB HID attack vector utilizes an emulated keyboard and onboard flash memory storage to simulate keystrokes on a victim machine. In this paper we propose an anomaly based approach to detect such an attack using a biometric called keystroke dynamics.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Crenshaw, A.: Programmable hid usb keystroke dongle: Using the teensy as a pen testing device. Defcon 18 (2010)
Furnell, S., Morrissey, J.P., Sanders, P.W., Stockel, C.T.: Applications of keystroke analysis for improved login security and continuous user authentication. In: SEC, pp. 283–294 (1996)
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)
Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: DSN, pp. 125–134. IEEE (2009)
Mittal, N.: Kautilya: Teensy beyond shells. In: BlackHat 2011 (2011)
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 73–82. ACM, New York (1999)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication (1999)
Wang, Z., Stavrou, A.: Exploiting smart-phone usb connectivity for fun and profit. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 357–366. ACM, New York (2010)
Wang, Z., Stavrou, A.: Attestation & authentication for usb communications. In: SERE 2012 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barbhuiya, F.A., Saikia, T., Nandi, S. (2012). An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)