Loading...

Proceedings of

International Conference on Advances in Computer and Information Technology ACIT 2013

"A TRAFFIC SIGNATURE SENSITIVE TO CLIENT MACHINES"

KAZUMASA OIDA
DOI
10.15224/978-981-07-6261-2-05
Pages
23 - 27
Authors
1
ISBN
978-981-07-6261-2

Abstract: “A robust authentication strategy requires a user to provide not only a password but also something the user has. Generally, “what you have” authentication methods require additional hardware to strengthen security. However, such devices are not widely used today. This paper proposes another “what you have” authentication approach, in which a user machine is identified by analyzing video traffic flowing from an authentication server to the user machine. This scheme is inexpensive and resistant to machine and credential theft. Experimental results demonstrate that the traffic signature used in this paper is responsive to a small difference between two user machines.”

Keywords: traffic signature, user authentication, two-factor authentication, video stream

Download PDF