skip to main content
10.1145/3123024.3123097acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Towards authentication using multi-modal online activities

Published:11 September 2017Publication History

ABSTRACT

This paper proposes an approach for active authentication that continuously verifies the identity of a user accessing multiple online services by means of their activity histories. We assess the performance and influence of various activity features extracted from the activity logs of 1,000 users accessing the Yahoo! JAPAN web sites. Our findings provide valuable insights to guide the development of an authentication system using users' online activities.

References

  1. M. Abramson, S. Gore. 2013. Associative Patterns of Web Browsing Behavior. In AAAI Fall Symp. Series.Google ScholarGoogle Scholar
  2. K. Bailey, J. Okolica, G. Peterson. 2014. User Identification and Authentication Using Multi-modal Behavioral Biometrics. Comput. Secur. (2014), 77--89.Google ScholarGoogle Scholar
  3. L. Fridman et al. 2016. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. IEEE Syst. J. (2016).Google ScholarGoogle Scholar
  4. A. Gervais et al. 2014. Quantifying Web-Search Privacy Arthur. In Proc. CCS. 966--977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Saevanee et al. 2015. Continuous User Authentication Using Multi-modal Biometrics. Comput. Secur. 53 (2015), 234--246. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Vasiete et al. 2014. Toward a Non-Intrusive, Physio-Behavioral Biometric for Smartphones. In Proc. MobileHCI '14. 501--506. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards authentication using multi-modal online activities

    Recommendations

    Reviews

    Eric Chan-Tin

    Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under a large user population. This type of authentication is important, as the most common form of authentication, password, is known to be hard to use. The authors also introduce the notion of bags with multiple actions and time periods for each bag. Machine learning is then used to predict the user. The accuracy obtained is about 80 percent. Although the accuracy is pretty high, the authors do not discuss whether this accuracy is practical. Some experimental and evaluation details are also missing, such as the machine learning algorithm used, the number of false positives, and the time taken to perform the ABA. Finally, not all the elements in table 1 are included in table 3. The intended audience for this paper is researchers in the field. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers
      September 2017
      1089 pages
      ISBN:9781450351904
      DOI:10.1145/3123024

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 September 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader