Detecting Stuffing of a User's Credentials at Her Own Accounts

被引:0
|
作者
Wang, Ke Coby [1 ]
Reiter, Michael K. [1 ]
机构
[1] Univ N Carolina, Dept Comp Sci, Chapel Hill, NC 27515 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a framework by which websites can coordinate to detect credential stuffing on individual user accounts. Our detection algorithm teases apart normal login behavior (involving password reuse, entering correct passwords into the wrong sites, etc.) from credential stuffing, by leveraging modern anomaly detection and carefully tracking suspicious logins. Websites coordinate using a novel private membership-test protocol, thereby ensuring that information about passwords is not leaked; this protocol is highly scalable, partly due to its use of cuckoo filters, and is more secure than similarly scalable alternatives in an important measure that we define. We use probabilistic model checking to estimate our credential-stuffing detection accuracy across a range of operating points. These methods might be of independent interest for their novel application of formal methods to estimate the usability impacts of our design. We show that even a minimal-infrastructure deployment of our framework should already support the combined login load experienced by the airline, hotel, retail, and consumer banking industries in the U.S.
引用
收藏
页码:2201 / 2218
页数:18
相关论文
共 50 条
  • [31] Narrative of terror and suffering: motherly accounts on her son's disappearance
    Araujo, Fabio
    SOCIEDADE E CULTURA, 2011, 14 (02): : 333 - 344
  • [32] Mother's willingness to pay for her own and her child's health: A contingent valuation study in Taiwan
    Liu, JT
    Hammitt, JK
    Wang, JD
    Liu, JL
    HEALTH ECONOMICS, 2000, 9 (04) : 319 - 326
  • [33] Children's Narrative Accounts and Judgments of Their Own Peer-Exclusion Experiences
    Wainryb, Cecilia
    Komolova, Masha
    Brehl, Beverly
    MERRILL-PALMER QUARTERLY-JOURNAL OF DEVELOPMENTAL PSYCHOLOGY, 2014, 60 (04): : 461 - 490
  • [34] Detecting User Profiles in Collaborative Ontology Engineering Using a User’s Interactions
    Van Laere S.
    Buyl R.
    Nyssen M.
    Debruyne C.
    Journal on Data Semantics, 2017, 6 (02) : 71 - 82
  • [35] Creation of Ideal User's Voice Using User's own UTAU Voice and Interactive Genetic Algorithm
    Inoue, Asami
    Nomura, Kota
    Fukumoto, Makoto
    2018 JOINT 10TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 19TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2018, : 559 - 563
  • [36] Shadow and substance: Reiniger's Carmen cuts her own capers
    Margolis, H
    Carmen: From Silent Film to MTV, 2005, 24 : 61 - 74
  • [37] What Is Security? The individual nurse's responsibility for her own security
    Stimson, Julia C.
    AMERICAN JOURNAL OF NURSING, 1938, 38 (06) : 658 - 662
  • [38] 'BEYOND HER OWN KNOWLEDGE' IN JANE AUSTEN'S PRIDE AND PREJUDICE
    Thomson, Heidi
    NOTES AND QUERIES, 2015, 62 (03) : 401 - 401
  • [39] A WOMB OF HER OWN: WOMEN'S STRUGGLE FOR SEXUAL AND REPRODUCTIVE AUTONOMY
    Goodman, Nancy R.
    Ellman, Paula L.
    JOURNAL OF THE AMERICAN PSYCHOANALYTIC ASSOCIATION, 2018, 66 (05) : 990 - 999
  • [40] Karen Blixen's translations of her own work (Isak Dinesen)
    Jones, WG
    SCANDINAVICA, 1998, 37 (01): : 45 - 65