Abstract
User and entity behavior analytics (UEBA) methods in fraud detection and advertising are widely used cognitive science methods in modern online banking systems. But profusion of marketing papers complicates true situation. Most of academic papers contain a systematic error: “Correct sample choice error”. Fed to the input the real data of user behavior in online banking do not nothing benefit. The paper will be submitted to the criticism of several methods on “mouse track analysis” and “keystroke dynamics” algorithms. New type of algorithms will be present: “preference-behavioral chain” methods. One “preference-behavioral chain” algorithm for social engineering detection will be presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cappelli R, Ferrara M, Maltoni D, Turroni F (2011) Fingerprint verification competition at IJCB2011. In: Proceedings of the IEEE/IAPR international conference on biometrics, pp 1–6
Huang GB, Learned-Miller E (2014) Labeled faces in the wild: updates and new reporting procedures, Report from University of Massachusetts, Amherst, UM-CS-2014-003
Greenberg G, Banse D, Doddington G, Garcia-Romero D, Godfrey J, Kinnunen T, Martin A, McCree A, Przybocki M, Reynolds D (2014) The NIST 2014 speaker recognition i-vector machine learning challenge. In: Odyssey 2014: the speaker and language recognition workshop, Joensuu, Finland
Phillips PJ, Flynn PJ, Beveridge JR, Scruggs WT, O’Toole AJ, Bolme D, Bowyer KW, Draper DA, Givens GH, Lui YM, Sahibzada H, Scallan JA, Weimer S (2009) Overview of the multiple biometrics grand challenge. LNCS, vol 5558, pp 705–714
Sayed B, Traore I, Woungang I, Obaidat MS (2013) biometric authentication using mouse gesture dynamics. IEEE Syst J 7(2):262–274
Feher C, Elovici Y, Moskovitch R, Rokach L, Schclar A (2012) User identity verification via mouse dynamics. Inf Sci 201:19–36
Hehman E, Stolier RM, Freeman JB (2014) Advanced mouse-tracking analytic techniques for enhancing psychological science. Group Process Intergroup Relat 18(3):384–401
Young JR, Davies RS, Jenkins JL, Pfleger I (2019) Keystroke dynamics: establishing keyprints to verify users in online courses. Comput Sch 36:48–68
Shanmugapriya D, Padmavathi G (2011) An efficient feature selection technique for user authentication using keystroke dynamics. Proc Int J Comput Sci Netw Secur 11:191–195
Jagadamba G, Sharmila SP, Gouda T (2013) A secured authentication system using an effective keystroke dynamics. In: Proceedings of emerging research in electronics, computer science and technology. LNEE, vol 248. Springer, pp 453–460
Monaco JV (2016) Robust keystroke biometric anomaly detection, arXiv preprint, pp 1–7
Gartner Group: Market guide for user and entity behavior analytics. https://www.gartner.com/doc/3538217/market-guide-user-entity-behavior. Accessed 20 Nov 2017
Schwarz M, Lackner F, Gruss D (2019) JavaScript template attacks: automatically inferring host information for targeted exploits. In: Network and Distributed Systems Security (NDSS) Symposium 2019, San Diego, CA, USA
Boda K, Földes ÁM, Gulyás GG, Imre S (2012) User tracking on the web via cross-browser fingerprinting. Lecture Notes in Computer Science, pp 31–46
Gómez-Boix A, Laperdrix P, Baudry B (2018) Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: Proceedings of the 2018 world wide web conference, pp 309–318
Cao Y, Li S, Wijmans E (2017) (Cross-)Browser fingerprinting via OS and hardware level features. In: NDSS Symposium 2017, Reports
Gaines RS, Lisowski W, Press SJ, Shapiro N (1980) Authentication by keystroke timing: some preliminary results, Technical report, DTIC Document
Breiman L (2001) Random forest. Mach Learn 45(1):5–32
sklearn.ensemble.RandomForestClassifier. https://scikit-learn.org/0.20/modules/generated/sklearn.ensemble.RandomForestClassifier.html. Accessed 10 Mar 2019
Gamboa H, Fred A (2004) A behavioral biometric system based on human-computer interaction. In: Proceedings of biometric technology for human identification, vol 5404
Hatfield JM (2018) Social engineering in cybersecurity: the evolution of a concept. Comput Secur 73:102–113
Krombholz K, Hobel H, Huber M, Weippl E (2015) Advanced social engineering attacks. J Inf Secur Appl 22:113–122
Next-generation antivirus, Cyberreason (2017). https://www.cybereason.com/blog/what-is-next-generation-antivirus-ngav. Accessed 10 Mar 2019
Slipenchuk P, Yankelevich D, Krylov P (2019, in printing) Social engineering detection in online banking by automatic user activity analysis, Group-IB, ICDM
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Slipenchuk, P., Epishkina, A. (2020). Practical User and Entity Behavior Analytics Methods for Fraud Detection Systems in Online Banking: A Survey. In: Samsonovich, A. (eds) Biologically Inspired Cognitive Architectures 2019. BICA 2019. Advances in Intelligent Systems and Computing, vol 948. Springer, Cham. https://doi.org/10.1007/978-3-030-25719-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-25719-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25718-7
Online ISBN: 978-3-030-25719-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)