| Paper Abstract and Keywords |
| Presentation |
2025-06-05 10:00
Data Type Categorization for Cybernetic Avatar Log-Based Authentication Method not Limited to Sepecific Games Ryosuke Kobayashi, Mhd Irvan, Franziska Zimmer, Maharage Nisansala Sevwandi Perera, Rie Shigetomi Yamaguchi (UTokyo) |
| Abstract |
(in Japanese) |
(See Japanese page) |
| (in English) |
Cooperative impersonation, in which a legitimate user voluntarily shares their authentication credentials with another individual, poses a growing security threat in online services. Unlike conventional impersonation attacks, this threat is difficult to detect because it involves intentional cooperation between the user and the impersonator. To address this issue, this study explores CA (Cybernetic Avatar) log-based authentication, which leverages behavioral logs generated during service usage. While this method is promising for detecting cooperative impersonation, its applicability has often been limited to specific services due to the service-dependent nature of log data. To enable general-purpose use, we propose a classification framework for log data based on two dimensions: data type and service characteristics. Using logs from the online game CS:GO, we applied our classification and analyzed the effectiveness of different data types in authentication. Our findings indicate that time-series data effectively captures user-specific behaviors and is particularly useful for detecting cooperative impersonation. This research represents a step toward developing a reusable, service-independent log-based authentication method. |
| Keyword |
(in Japanese) |
(See Japanese page) |
| (in English) |
Log-based Authentication / Cooperative Impersonation / Cybernetic Avatar / Data Type Categorization / / / / |
| Reference Info. |
ITE Tech. Rep. |
| Paper # |
|
| Date of Issue |
|
| ISSN |
Online edition: ISSN 2424-1970 |
| Download PDF |
|
| Conference Information |
| Committee |
IST ME IEICE-IE IEICE-BioX IEICE-SIP IEICE-MI |
| Conference Date |
2025-06-05 - 2025-06-06 |
| Place (in Japanese) |
(See Japanese page) |
| Place (in English) |
|
| Topics (in Japanese) |
(See Japanese page) |
| Topics (in English) |
|
| Paper Information |
| Registration To |
IEICE-BioX |
| Conference Code |
2025-06-IST-ME-IE-BioX-SIP-MI |
| Language |
Japanese |
| Title (in Japanese) |
(See Japanese page) |
| Sub Title (in Japanese) |
(See Japanese page) |
| Title (in English) |
Data Type Categorization for Cybernetic Avatar Log-Based Authentication Method not Limited to Sepecific Games |
| Sub Title (in English) |
|
| Keyword(1) |
Log-based Authentication |
| Keyword(2) |
Cooperative Impersonation |
| Keyword(3) |
Cybernetic Avatar |
| Keyword(4) |
Data Type Categorization |
| Keyword(5) |
|
| Keyword(6) |
|
| Keyword(7) |
|
| Keyword(8) |
|
| 1st Author's Name |
Ryosuke Kobayashi |
| 1st Author's Affiliation |
The University of Tokyo (UTokyo) |
| 2nd Author's Name |
Mhd Irvan |
| 2nd Author's Affiliation |
The University of Tokyo (UTokyo) |
| 3rd Author's Name |
Franziska Zimmer |
| 3rd Author's Affiliation |
The University of Tokyo (UTokyo) |
| 4th Author's Name |
Maharage Nisansala Sevwandi Perera |
| 4th Author's Affiliation |
The University of Tokyo (UTokyo) |
| 5th Author's Name |
Rie Shigetomi Yamaguchi |
| 5th Author's Affiliation |
The University of Tokyo (UTokyo) |
| 6th Author's Name |
|
| 6th Author's Affiliation |
() |
| 7th Author's Name |
|
| 7th Author's Affiliation |
() |
| 8th Author's Name |
|
| 8th Author's Affiliation |
() |
| 9th Author's Name |
|
| 9th Author's Affiliation |
() |
| 10th Author's Name |
|
| 10th Author's Affiliation |
() |
| 11th Author's Name |
|
| 11th Author's Affiliation |
() |
| 12th Author's Name |
|
| 12th Author's Affiliation |
() |
| 13th Author's Name |
|
| 13th Author's Affiliation |
() |
| 14th Author's Name |
|
| 14th Author's Affiliation |
() |
| 15th Author's Name |
|
| 15th Author's Affiliation |
() |
| 16th Author's Name |
|
| 16th Author's Affiliation |
() |
| 17th Author's Name |
|
| 17th Author's Affiliation |
() |
| 18th Author's Name |
|
| 18th Author's Affiliation |
() |
| 19th Author's Name |
|
| 19th Author's Affiliation |
() |
| 20th Author's Name |
|
| 20th Author's Affiliation |
() |
| 21st Author's Name |
|
| 21st Author's Affiliation |
() |
| 22nd Author's Name |
|
| 22nd Author's Affiliation |
() |
| 23rd Author's Name |
|
| 23rd Author's Affiliation |
() |
| 24th Author's Name |
|
| 24th Author's Affiliation |
() |
| 25th Author's Name |
|
| 25th Author's Affiliation |
() |
| 26th Author's Name |
/ / |
| 26th Author's Affiliation |
()
() |
| 27th Author's Name |
/ / |
| 27th Author's Affiliation |
()
() |
| 28th Author's Name |
/ / |
| 28th Author's Affiliation |
()
() |
| 29th Author's Name |
/ / |
| 29th Author's Affiliation |
()
() |
| 30th Author's Name |
/ / |
| 30th Author's Affiliation |
()
() |
| 31st Author's Name |
/ / |
| 31st Author's Affiliation |
()
() |
| 32nd Author's Name |
/ / |
| 32nd Author's Affiliation |
()
() |
| 33rd Author's Name |
/ / |
| 33rd Author's Affiliation |
()
() |
| 34th Author's Name |
/ / |
| 34th Author's Affiliation |
()
() |
| 35th Author's Name |
/ / |
| 35th Author's Affiliation |
()
() |
| 36th Author's Name |
/ / |
| 36th Author's Affiliation |
()
() |
| Speaker |
Author-1 |
| Date Time |
2025-06-05 10:00:00 |
| Presentation Time |
25 minutes |
| Registration for |
IEICE-BioX |
| Paper # |
|
| Volume (vol) |
vol.49 |
| Number (no) |
|
| Page |
|
| #Pages |
|
| Date of Issue |
|