On the Security of Trustee-Based Social

advertisement
On the Security of Trustee-Based Social
Authentications
Abstract:
Recently, authenticating users with the help of their friends (i.e., trustee-based social
authentication) has been show into be a promising backup authentication mechanism. A user in
this system is associated with a few trustees that were selected from the user’s friends. When the
user wants to regain access to the account, the service provider sends different verification codes
to the user’s trustees. The user must obtain at least k(i.e., recovery threshold) verification codes
from the trustees before being directed to reset his or her password. In this paper, we provide the
first systematic study about the security of trustee based social authentications. In particular, we
first introduce a novel framework of attacks, which we call forest fire attacks. In these attacks, an
attacker initially obtains a small number of compromised users, and then the attacker iteratively
attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a
probabilistic model to formalize the threats of forest fire attacks and their costs for attackers.
Moreover, we introduce various defense strategies. Finally, we apply our frame work to
extensively evaluate various concrete attack and defense strategies using three real-world social
network datasets. Our results have strong implications for the design of more secure trusteebased social authentications
Existing System:
Existing backup systems may use ‘secret’ personal questions and alternate email
addresses for backup authentication in the event users forget or loses his access credentials.
However, these methods are frequently unreliable. For personal questions, users often forget
their answers, especially when answers are case and punctuation sensitive. It is also common for
acquaintances of the respective users to be able to guess the answers, even acquaintances not
closely associated with the respective account holders or users. In existing methods, many times
the questions are not applicable to the general public, not memorable, ambiguous, easily
guessable with no knowledge of the account holder, or easily guessable with minimal knowledge
of the account holder.
www.chennaisunday.com
Problems on existing system:
1. An account holder who tries to authenticate an account using an alternate email address
many times finds that the configured address expired upon a change of job, school or
Internet service provider. Since other websites rely on email addresses to authenticate
their account holders when passwords fail, it is especially important for webmail
providers to have a secure and reliable authentication mechanism of last resort.
2. The ubiquity of mobile phones has made them an attractive option for backup
authentication. Some entities already send SMS messages containing authorization codes
to supplement primary authentication for high-risk transactions. However, authenticating
users by their mobile phones alone is risky as phones are frequently shared or lost .
Proposed System:
A social authentication system for backup account recovery is described. The backup account
recovery system provides for an account holder to obtain his or her password in the event the
account holder is unable to gain access to an account using the primary authentication method.
The social authentication system allows the account holder to contact several trustees that were
previously selected and identified. Upon being unable to gain access to an account, the account
holder contacts one or more trustees to inform them that the account holder needs to regain
access to the account and therefore needs to obtain an account recovery code from each trustee.
Each trustee may then contact the account recovery system which resides in servers accessible on
the Internet. The account recovery system then verifies that the trustee's contact information
matches that of a previously identified trustee for the specified account holder. Once the trustee's
contact information has been verified to match that of a previously identified trustee for the
specified account holder, the account recovery system begins a back and forth dialog with the
trustee, whereby the trustees provide information, transmit a link and code provided by the
account recovery system, vouch for their contact with the account holder and pledge that the
statements they have provided are accurate and that the trustees agree on the course of action.
www.chennaisunday.com
Once this dialog is successfully completed, each trustee is provided with a unique account
recovery code, which is then provided to the account holder. Once the required account recovery
codes has been received, the account holder is able to use them to obtain access to the account.
Advantages:
The social authentication system is a system in which account holders initially appoint and later
rely on account trustees to help them authenticate.
Architecture:-
.
Implementation:
Implementation is the stage of the project when the theoretical design is turned out
into a working system. Thus it can be considered to be the most critical stage in achieving a
www.chennaisunday.com
successful new system and in giving the user, confidence that the new system will work and
be effective.
The implementation stage involves careful planning, investigation of the existing
system and it’s constraints on implementation, designing of methods to achieve changeover
and evaluation of changeover methods.
Main Modules:1. Trustee-Based Social Authentication Module:
A trustee-based social authentication includes two phases:.

Registration Phase:
The system prepares trustees for a user Alice in this phase. Specifically, Alice is
first authenticated with her main authenticator (i.e., password),and then a
few(e.g., 5) friends, who also have accounts in the system, are selected by either
Alice herself or the service provider from Alice’s friend list and are appointed as
Alice’s trustees.

Recovery Phase:
When Alice forgets her password or her password was compromised and changed
by an attacker, she recovers her account with the help of her trustees in this phase.
Specifically, Alice first sends an account recovery request with her user name to
the service provider which then shows Alice an URL. Alice is required to share
this URL with her trustees. Then, her trustees authenticate themselves into the
system and retrieve verification codes using the given URL. Alice then obtains
the verification codes from her trustees via emailing them, calling them, or
meeting them in person. If Alice obtains a sufficient number (e.g., 3)of
verification codes and presents them to the service provider, then Alice is
authenticated and is directed to reset her password. We call the number of
verification codes required to be authenticated the recovery threshold.
2. Security Module:
www.chennaisunday.com
Authentication is essential for securing your account and preventing spoofed messages from
damaging your online reputation. Imagine a phishing email being sent from your mail
because someone had forged your information. Angry recipients and spam complaints
resulting from it become your mess to clean up, in order to repair your reputation. trusteebased social authentication systems ask users to select their own trustees without any
constraint. In our experiments (i.e., Section VII), we show that the service provider can
constrain trustee selections via imposing that no users are selected as trustees by too many
other users, which can achieve better security guarantees.
3. Backup Authentication Module :
A user in this system is associated with a few trustees that were selected from the user’s
friends. When the user wants to regain access to the account, the service provider sends
different verification codes to the user’s trustees. The user must obtain at least k(i.e.,
recovery threshold) verification codes from the trustees before being directed to reset his or
her password. Backup authentication feature allows you to select three to five friends as your
trustees. In cases when you forget your password or your account is hacked, each of these
trustees will be able to get a security code for you. With three security codes, you can recover
your account.
4. Forest Fire Attacks Module:
In a forest fire attack, the attacker first uses traditional methods such as phishing and
guessing to compromise some users (these are called seed users), and then the attacker
propagates the attacks to other users by exploiting the “trusted contacts”.
Our forest fire attacks consist of Ignition Phase and Propagation Phase:
1. Ignition Phase:
An attacker obtains a small number of compromised users which we call seed users. They
would be obtained from phishing attacks, statistical guessing, and password database
leaks, or they could be a coalition of users who collude each other. Indeed, a large
number of social network accounts were reported to be compromised. showing the
feasibility of obtaining compromised seed users.
www.chennaisunday.com
2. Propagation Phase:
Given the seed users, the attacker iteratively attacks other users. In each attack iteration,
the attacker performs one attack trial to each of the uncompromised users according to
some attack ordering of them. In an attack trial to a user u, the attacker sends an account
recovery request with username to the service provider, which issues different
verification codes to trustees. The
goal of the attacker is to obtain verification codes from atleast one trustees. If at least one
trustees of User are already compromised, the attacker can easily compromised user
otherwise, the attacker can impersonate and send a spoofing message to each
uncompromised trustee of user to request the verification code.
System Configuration:
H/W System Configuration:
Processor
- Pentium –III
Speed
- 1.1 Ghz
RAM
- 256 MB(min)
Hard Disk
- 20 GB
Floppy Drive
- 1.44 MB
Key Board
- Standard Windows Keyboard
Mouse
- Two or Three Button Mouse
Monitor
- SVGA
www.chennaisunday.com
S/W System Configuration:
Operating System
:
Windows95/98/2000/XP
Front End
:
Core Java
Database
: Mysql 5.0
Database Connectivity
: JDBC.
www.chennaisunday.com
Download