Abstract
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
em, A Python Package for Learning Gaussian Mixture Models with Expectation Maximization, http://www.ar.media.kyoto-u.ac.jp/members/david/softwares/em/
Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Combining biometric evidence for person authentication. In: Tistarelli, M., Bigun, J., Grosso, E. (eds.) Advanced Studies in Biometrics. LNCS, vol. 3161, pp. 1–18. Springer, Heidelberg (2005)
Brunelli, R., Falavigna, D.: Person identification using multiple cues. IEEE Transactions on Pattern Analysis and Machine Intelligence (1995)
Chang, K., Hightower, J., Kveton, B.: Inferring identity using accelerometers in television remote controls. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 151–167. Springer, Heidelberg (2009)
Damiani, M.L., Silvestri, C.: Towards movement-aware access control. In: SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: MobiSys (2010)
Furnell, S., Clarke, N., Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud and Security (2008)
Gafurov, D., Helkala, K., Søndrol, T.: Biometric gait authentication using accelerometer sensor. JCP 1(7), 51–59 (2006)
Greenstadt, R., Beal, J.: Cognitive security for personal devices. In: AISec (2008)
Jakobsson, M., Juels, A.: Server-side detection of malware infection. In: NSPW (2009)
Kale, A., Cuntoor, N., Krüger, V.: Gait-Based Recognition of Humans Using Continuous HMMs. In: Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition, FGR 2002 (2002)
Leggett, G., Williams, J., Usnick, M.: Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies (1998)
Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)
Moore, A.: Lecture Notes: Gaussian Mixture Models, http://www.cs.cmu.edu/afs/cs/Web/People/awm/tutorials/gmm.html
Nisenson, M., Yariv, I., El-Yaniv, R., Meir, R.: Towards behaviometric security systems: Learning to identify a typist. In: Lavrač, N., Gamberger, D., Todorovski, L., Blockeel, H. (eds.) PKDD 2003. LNCS (LNAI), vol. 2838, pp. 363–374. Springer, Heidelberg (2003)
Rainie, L., Anderson, J.: The Future of the Internet III, http://www.pewinternet.org/Reports/2008/The-Future-of-the-Internet-III.aspx
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 2003 (2003)
Schroeder, S.: Smartphones Are Selling Like Crazy, http://mashable.com/2010/02/05/smartphones-sales/
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit Authentication through Learning User Behavior. Full online version, http://midgard.cs.ucdavis.edu/~niu/papers/isc2010full.pdf
Whitney, L.: Smartphones to dominate PCs in Gartner forecast, http://news.cnet.com/8301-1001_3-10434760-92.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, E., Niu, Y., Jakobsson, M., Chow, R. (2011). Implicit Authentication through Learning User Behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-18178-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18177-1
Online ISBN: 978-3-642-18178-8
eBook Packages: Computer ScienceComputer Science (R0)