Advertisement

An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics

  • Ferdous A. Barbhuiya
  • Tonmoy Saikia
  • Sukumar Nandi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)

Abstract

Recently, a new class of USB based attacks has emerged which unlike previous USB based threats does not exploit any vulnerability or depend on any operating system feature. The USB HID attack vector utilizes an emulated keyboard and onboard flash memory storage to simulate keystrokes on a victim machine. In this paper we propose an anomaly based approach to detect such an attack using a biometric called keystroke dynamics.

Keywords

Keystroke Dynamics Biometrics USB HID Attack Anomaly Detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Crenshaw, A.: Programmable hid usb keystroke dongle: Using the teensy as a pen testing device. Defcon 18 (2010)Google Scholar
  5. 5.
    Furnell, S., Morrissey, J.P., Sanders, P.W., Stockel, C.T.: Applications of keystroke analysis for improved login security and continuous user authentication. In: SEC, pp. 283–294 (1996)Google Scholar
  6. 6.
    Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)CrossRefGoogle Scholar
  7. 7.
    Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: DSN, pp. 125–134. IEEE (2009)Google Scholar
  8. 8.
    Mittal, N.: Kautilya: Teensy beyond shells. In: BlackHat 2011 (2011)Google Scholar
  9. 9.
    Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 73–82. ACM, New York (1999)CrossRefGoogle Scholar
  10. 10.
    Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication (1999)Google Scholar
  11. 11.
    Wang, Z., Stavrou, A.: Exploiting smart-phone usb connectivity for fun and profit. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 357–366. ACM, New York (2010)CrossRefGoogle Scholar
  12. 12.
    Wang, Z., Stavrou, A.: Attestation & authentication for usb communications. In: SERE 2012 (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ferdous A. Barbhuiya
    • 1
  • Tonmoy Saikia
    • 1
  • Sukumar Nandi
    • 1
  1. 1.Department of Computer Science and EngineeringIndian Institute of TechnologyGuwahatiIndia

Personalised recommendations