Abstract
With the expansion of smart device users, the security mechanism of these devices in terms of user authentication has been advanced a lot. These mechanisms consist of a pattern based authentication, biometric based authentication, etc. For security purpose whenever a user fails to authenticate themselves, these devices get locked. But as these devices consist of numerous applications (document creator, pdf viewer, e-banking, Social networking app, etc.), locking of the whole devices prevents the user from using any of the applications. Since the variety of applications provided by the devices have different security needs, we feel it is better to have application level security rather than device level. Here, in this paper, we have proposed a behavioral biometric based user authentication mechanism for application level security. First, we have performed a risk assessment of different applications. Then for complete protection, static multi-modal (keystroke and mouse dynamics) authentication at the start of an interactive session, and a continuous keystroke authentication during this session is performed. An analysis of the proposed authentication mechanism has been conducted on the basis of false acceptance rate (FAR), false rejection rate (FRR) and equal error rate (EER). The static multi-modal authentication achieved a FAR of 0.89%, FRR of 1.2% and EER of 1.04% using J48 classification algorithm. Whereas the continuous keystroke authentication has been analyzed by the time (no. of keystrokes pressed) taken to capture an intruder.



Similar content being viewed by others
References
Fan, C. I., Chan, Y. C., & Zhang, Z. K. (2005). Robust remote authentication scheme with smart cards. Computers and Security, 24(8), 619–628.
Lee, S. W., Kim, H. S., & Yoo, K. Y. (2005). Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation, 167(1), 355–361.
Liu, J. Y., Zhou, A. M., & Gao, M. X. (2008). A new mutual authentication scheme based on nonce and smart cards. Computer Communications, 31(10), 2205–2209.
Xu, J., Zhu, W.-T., & Feng, D.-G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723–728.
Li, L.-H., Lin, I.-C., & Hwang, M.-S. (2001). A remote password authentication scheme for multiserver architecture using neural networks. IEEE Transactions on Neural Networks, 12(6), 1498–1504.
Weiss, R., & De Luca, A. (2008). PassShapes: Utilizing stroke based authentication to increase password memorability. In Proceedings of the 5th Nordic conference on human–computer interaction: building bridges (pp. 383–392). ACM.
Gao, H., Guo, X., Chen, X., Wang, L., & Liu, X. (2008). Yagp: Yet another graphical password strategy. In Computer security applications conference, 2008. ACSAC 2008. Annual (pp. 121–129). IEEE.
Bicakci, K., Atalay, N. B., Yuceel, M., Gurbaslar, H., & Erdeniz, B. (2009). Towards usable solutions to graphical password hotspot problem. In Computer software and applications conference, 2009. COMPSAC’09. 33rd annual IEEE international (Vol. 2, pp. 318–323). IEEE.
Chang, C. C., & Lin, I. C. (2004). Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operating Systems Review, 38(4), 91–96.
Kim, H. S., Lee, S. W., & Yoo, K. Y. (2003). ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 37(4), 32–41.
Scott, M. (2004). Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Operating Systems Review, 38(2), 73–75.
Choi, H., Choi, K., & Kim, J. (2011). Fingerprint matching incorporating ridge features with minutiae. IEEE Transactions on Information Forensics and Security, 6(2), 338–345.
Das, R. K., Mukhopadhyay, S., & Bhattacharya, P. (2014). User authentication based on keystroke dynamics. IETE Journal of Research, 60(3), 229–239.
Aviv, A. J., Gibson, K. L., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. Woot, 10, 1–7.
Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20.
Gunetti, D., & Picardi, C. (2005). Keystroke analysis of free text. ACM Transactions on Information and System Security (TISSEC), 8(3), 312–347.
Pusara, M. (2007). An examination of user behavior for user re-authentication. Ph.D diss., Purdue University.
Marsters, J.-D. (2009). Keystroke dynamics as a biometric. Ph.D. diss, University of Southampton.
Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011). Behaviour profiling for transparent authentication for mobile devices. Academic Publishing Ltd, UK.
Bours, P. (2012). Continuous keystroke dynamics: A different perspective towards biometric evaluation. Information Security Technical Report, 17(1–2), 36–43.
Bailey, K. O., Okolica, J. S., & Peterson, G. L. (2014). User identification and authentication using multi-modal behavioral biometrics. Computers and Security, 43, 77–89.
Roth, J., Liu, X., & Metaxas, D. (2014). On continuous user authentication via typing behavior. IEEE Transactions on Image Processing, 23(10), 4611–4624.
Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2014). Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security, 13(3), 229–244.
Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53, 234–246.
Patel, V. M., Chellappa, R., Chandra, D., & Barbello, B. (2016). Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Processing Magazine, 33(4), 49–61.
Mondal, S., & Bours, P. (2017). A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing, 230, 1–22.
Fenu, G., Marras, M., & Boratto, L. (2018). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters, 113, 83–92.
Kim, J., Kim, H., & Kang, P. (2018). Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Applied Soft Computing, 62, 1077–1087.
Liew, K.-M., Shen, H., See, S., Cai, W., Fan, P., & Horiguchi, S. (Eds.). (2004). Parallel and distributed computing: applications and technologies: 5th international conference, PDCAT 2004, Singapore, December 8–10, 2004, Proceedings (Vol. 3320). Springer.
Cho, S., & Hwang, S. (2006). Artificial rhythms and cues for keystroke dynamics based authentication. In International conference on biometrics (pp. 626–632). Berlin: Springer.
Hocquet, S., Ramel, J.-Y., & Cardot, H. (2007). User classification for keystroke dynamics authentication. In Advances in biometrics (pp. 531–539).
Rybnik, M., Tabedzki, M., & Saeed, K. (2008). A keystroke dynamics based system for user identification. In Computer information systems and industrial management applications, 2008. CISIM’08. 7th (pp. 225–230). IEEE.
Revett, K. (2009). A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of Control, Automation and Systems, 7(1), 7–15.
Giot, R., El-Abed, M., Hemery, B., & Rosenberger, C. (2011). Unconstrained keystroke dynamics authentication with shared secret. Computers and Security, 30(6), 427–445.
Visumathi, J., & Jesu Jayarin., P. (2015). A secured and reliable biometric user authentication using keystroke template method. Journal of Applied Security Research, 10(3), 375–384.
Abdi, H. (2010). Coefficient of variation. Encyclopedia of Research Design, 1, 169–171.
Yazar, Z. (2002). A qualitative risk analysis and management tool—CRAMM. SANS InfoSec Reading Room White Paper, 11, 12–32.
Danielsson, P.-E. (1980). Euclidean distance mapping. Computer Graphics and Image Processing, 14(3), 227–248.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
Rights and permissions
About this article
Cite this article
Neha, Chatterjee, K. Continuous User Authentication System: A Risk Analysis Based Approach. Wireless Pers Commun 108, 281–295 (2019). https://doi.org/10.1007/s11277-019-06403-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06403-0