Detecting Stuffing of a User's Credentials at Her Own Accounts

被引:0
|
作者
Wang, Ke Coby [1 ]
Reiter, Michael K. [1 ]
机构
[1] Univ N Carolina, Dept Comp Sci, Chapel Hill, NC 27515 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a framework by which websites can coordinate to detect credential stuffing on individual user accounts. Our detection algorithm teases apart normal login behavior (involving password reuse, entering correct passwords into the wrong sites, etc.) from credential stuffing, by leveraging modern anomaly detection and carefully tracking suspicious logins. Websites coordinate using a novel private membership-test protocol, thereby ensuring that information about passwords is not leaked; this protocol is highly scalable, partly due to its use of cuckoo filters, and is more secure than similarly scalable alternatives in an important measure that we define. We use probabilistic model checking to estimate our credential-stuffing detection accuracy across a range of operating points. These methods might be of independent interest for their novel application of formal methods to estimate the usability impacts of our design. We show that even a minimal-infrastructure deployment of our framework should already support the combined login load experienced by the airline, hotel, retail, and consumer banking industries in the U.S.
引用
收藏
页码:2201 / 2218
页数:18
相关论文
共 50 条
  • [1] Towards Detecting Fake User Accounts in Facebook
    Gupta, Aditi
    Kaushal, Rishabh
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 137 - 142
  • [2] User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper
    Jurisic, M.
    Tomicic, I.
    Grd, P.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2023, 23 (03) : 102 - 113
  • [3] Detecting Malicious User Accounts Using Canvas Fingerprint
    Abouollo, Ahmed
    Almuhammadi, Sultan
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 358 - 361
  • [4] Detecting Social Bookmark Spams using Multiple User Accounts
    Sakakura, Yuta
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 1153 - 1158
  • [5] A voice of her own? Echo's own echo
    Kall, Lisa Folkmarson
    CONTINENTAL PHILOSOPHY REVIEW, 2015, 48 (01) : 59 - 75
  • [6] A voice of her own? Echo’s own echo
    Lisa Folkmarson Käll
    Continental Philosophy Review, 2015, 48 : 59 - 75
  • [7] Maeve's Times: In Her Own Words
    Verma, Henrietta
    LIBRARY JOURNAL, 2014, 139 (13) : 95 - 95
  • [8] In her own words: accounts of sexual and (non) reproductive life of young Mexican women during the 1960s and 1970s
    Felitti, Karina
    DYNAMIS, 2018, 38 (02) : 333 - 361
  • [9] Reporting PFI in annual accounts: A user's perspective
    Hodges, R
    Mellett, H
    PUBLIC MONEY & MANAGEMENT, 2004, 24 (03) : 153 - 158
  • [10] Whose socioeconomic status influences a woman's obesity risk: her mother's, her father's, or her own?
    Ball, K
    Mishra, GD
    INTERNATIONAL JOURNAL OF EPIDEMIOLOGY, 2006, 35 (01) : 131 - 138