Conference Proceedings

International Conference on Advances in Computer and Information Technology - ACIT 2013

A Traffic Signature Sensitive to Client Machines

Author(s) : KAZUMASA OIDA

Abstract

A robust authentication strategy requires a user to provide not only a password but also something the user has. Generally, “what you have” authentication methods require additional hardware to strengthen security. However, such devices are not widely used today. This paper proposes another “what you have” authentication approach, in which a user machine is identified by analyzing video traffic flowing from an authentication server to the user machine. This scheme is inexpensive and resistant to machine and credential theft. Experimental results demonstrate that the traffic signature used in this paper is responsive to a small difference between two user machines.

Conference Title : International Conference on Advances in Computer and Information Technology - ACIT 2013
Conference Date(s) : May 04-05, 2013
Place : Hotel Shangri-La, Kuala Lumpur, Malaysia
No fo Author(s) : 1
DOI : 10.15224/978-981-07-6261-2-05
Page(s) : 23 - 27
Electronic ISBN : 978-981-07-6261-2
Views : 1046   |   Download(s) : 204