AccessControl Winter2024 Part2 Posted
AccessControl Winter2024 Part2 Posted
enrolment stage
100% match
required.
https://www.talwork.net/has-your-password-been-leaked
Authentication: Something you are …
Example: enrollment & authentication in biometric syst.
Database of biometrics
user profiles (feature vectors).
enrolment stage in
biometric systems is
much more involved !!!
https://www.tutorialspoint.com/biometrics/biometrics_quick_guide.htm
Authentication: Something you are …
https://www.researchgate.net/publication/281659557_Soft_Biometrics_for_Keystroke_Dyn
amics/figures?lo=1
Authentication: Something you are …
IRIS - colored section of an eye RETINA - cannot be seen by naked eye - the
scan = 2 seconds of near IR imaging ☺ network of blood vessels
subject can be at some distance ☺ most reliable biometrics, aside from DNA ☺
alcohol consumption changes iris but can be affected by eye-disease
scan = 15 seconds of low-energy IR scanning
subject has to be close to scanner
Authentication: Something you are …
Should the
entire scan
(image) be
stored ??
STAGE 1:
STAGE 2:
Authentication: Something you are …
Example: Extraction of biometrics features
https://creativentechno.wordpress.com/2012/02/18/face-recognition/
Authentication: Something you are …
Types of Biometric Systems (Uses)
1) systems for IDENTIFICATION
➢ perform 1:n comparison to identify a user from a database of n users
look
through
profiles
find
user’s
profile
Authentication: Something you are …
Biometric Accuracy / Performance
in all biometrics schemes, some physical
characteristic of the individual is mapped
NOISE is the biggest challenge of
biometrics system performance: into digital representation
1) Noise during enrollment (to
create an accurate profile)
2) Noise during deployment
however, physical characteristics may change
(identification / authentication). ➢ facial contours and color may be influenced by
clothing, hairstyle, facial hair, …
➢ the results of fingerprint scan may vary as a
function of: finger placement, finger swelling and
skin dryness …
user 1:
multiple mappings may have to be taken
in order to create a (statistically) useful
user 2: biometric representation / profile
a biometric sensor must be able to adapt
to a broad range of appearances
Authentication: Something you are …
match
Biometric Accuracy score
user
statistical distribution of ‘match score’ between s profile
user’s new scan and user’s stored profile/record new scan
unfortunately, range of
new scan has large scores/features for any
deviation relative to
user profile particular user is likely
to overlap with scores/
new scan has small
deviation relative to
user profile (e.g. 90%)
/features of other users
for most other by moving the ‘decision
users, similarity
about (e.g.) 30% new scan
perfectly matches threshold’, sensitivity of
user profile
biomet. system changes
0% 100%
lower scores for imposters higher scores for genuine user move t to left
system more tolerant
to noise , but also
system more likely to
accept wrong person
Authentication: Something you are …
probability of
false reject probability of
false accept
reject admit
https://people.scs.carleton.ca/~paulv/toolsjewels/ch3-long.pdf
Authentication: Something you are …
Biometric systems are typically described in
terms of their probability of FR & FA
Biometric Accuracy (cont.) across all user profiles !
against impostors
Authentication: Something you are …
# rejected passengers =
= (1000 * 0.03) [rejects / hour] * 14 [hours] =
= 30 [rejects / hour] * 14 [hours] =
= 420 [rejects]
Authentication: Something you are …
http://www.cse.lehigh.edu/prr/Biometrics/Archive/Papers/rc22481.pdf
Authentication: Something you are …
low threshold
False Accept
Authentication: Something you are …
CER
Authentication: Something you produce …
https://www.keytrac.net/en/
Example: Cost vs. accuracy of various biometric
characteristics
DNA
Authentication (cont.)
Example: Biometrics accuracy vs. acceptance
Organizations implementing biometrics must carefully balance
a system’s effectiveness against its perceived intrusiveness and
acceptability to users …
Authentication (cont.)
Authentication (cont.)
Example: Attacks on password-based authenticat. systems
Attacks Authenticators Examples
breaking
(try to ‘get Client attack Password Guessing, exhaustive search
into’ the Plaintext theft,
system by Host attack Password
dictionary/exhaustive search
using a
legitimate Eavesdropping Password "Shoulder surfing"
password)
Replay Password Replay stolen password response
Installation of rogue client or
disabling Trojan horse Password
capture device
(prevent
Lockout by multiple failed
legitimate Denial of service Password
user from authentications
getting into
the system)
1 protected
2 system
Authentication (cont.)
Example: Standard vs. Targeted DoS Attacks
Standard DoS Attack
Attacker’s goal is to prevent victim-
server from providing access/service
to all legitimate user.
X
Targeted DoS Attack
Attacker’s goal is to prevent one
X particular victim-user from obtaining
access/service from a server.
Most systems ‘lock-out’ a user after
multiple login attempts using false
password ….
Authentication (cont.)
Example: Attacks on biometrics-based authenticat. systems
https://www.nxp.com/docs/en/white-paper/SECBIOAUTHWP.pdf
Authentication (cont.)
Example: Single- and multi- factor authentication
http://www.google.ca/landing/2step/