ABSTRACT
This paper proposes an approach for active authentication that continuously verifies the identity of a user accessing multiple online services by means of their activity histories. We assess the performance and influence of various activity features extracted from the activity logs of 1,000 users accessing the Yahoo! JAPAN web sites. Our findings provide valuable insights to guide the development of an authentication system using users' online activities.
- M. Abramson, S. Gore. 2013. Associative Patterns of Web Browsing Behavior. In AAAI Fall Symp. Series.Google Scholar
- K. Bailey, J. Okolica, G. Peterson. 2014. User Identification and Authentication Using Multi-modal Behavioral Biometrics. Comput. Secur. (2014), 77--89.Google Scholar
- L. Fridman et al. 2016. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. IEEE Syst. J. (2016).Google Scholar
- A. Gervais et al. 2014. Quantifying Web-Search Privacy Arthur. In Proc. CCS. 966--977. Google ScholarDigital Library
- H. Saevanee et al. 2015. Continuous User Authentication Using Multi-modal Biometrics. Comput. Secur. 53 (2015), 234--246. Google ScholarDigital Library
- E. Vasiete et al. 2014. Toward a Non-Intrusive, Physio-Behavioral Biometric for Smartphones. In Proc. MobileHCI '14. 501--506. Google ScholarDigital Library
Index Terms
- Towards authentication using multi-modal online activities
Recommendations
An adaptive approach for continuous multi-factor authentication in an identity eco-system
CISR '14: Proceedings of the 9th Annual Cyber and Information Security Research ConferenceMulti-factor Authentication (MFA) is the current trend to genuinely identify the legitimate users in cyber eco-system through an active authentication process. This process includes passwords, security token, biometrics, human cognitive behavior metrics,...
Multi-Device Authentication using Wearables and IoT
ICETE 2016: Proceedings of the 13th International Joint Conference on e-Business and TelecommunicationsThe paper presents a novel cryptographic authentication scheme that makes use of the presence of electronic devices around users. The scheme makes authentication more secure by involving devices that are usually worn by users (such as smart-watches, ...
Active Authentication Experiments Using Actual Application Usage Log
RESEC '18: Proceedings of the First Workshop on Radical and Experiential SecurityActive authentication is a user authentication scheme that uses the user's behavioral characteristics and environmental information collected in the background, to reduce the number of explicit authentication requests. In this paper, we propose active ...
Comments