skip to main content
10.1145/3546118.3546152acmotherconferencesArticle/Chapter ViewAbstractPublication PagescompsystechConference Proceedingsconference-collections
research-article

Security Aspects of Behavioral Biometrics for Strong User Authentication

Authors Info & Claims
Published:14 August 2022Publication History

ABSTRACT

Efficient user identification and authentication are fundamental for securing access to systems processing sensitive data. This paper provides an analysis of current research in the field of user identification and identity verification with a focus on the behavioral biometrics supported by Machine Learning. It identifies the methods for user modeling with the potential of application in real-world scenarios such as strong authentication and fraud detection domain. This paper further elaborates on the current state-of-the-art approaches, feature extraction, and classification methods. We describe our experimental setup and provide an evaluation of our method in the selected deployment. We focus on user interactions in a controlled web environment. We performed classification experiments with the machine learning models on various datasets showing promising results in the robustness and proving relevance as a modern non-intrusive security measure.

References

  1. Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, and David Mohaisen. 2021. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet of Things Journal 8, 1 (jan 2021), 65–84. https://doi.org/10.1109/JIOT.2020.3020076 arxiv:2001.08578Google ScholarGoogle ScholarCross RefCross Ref
  2. Ahmed Awad E. Ahmed and Issa Traore. 2007. A new biometrie technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing 4, 3 (2007), 165–179. https://doi.org/10.1109/TDSC.2007.70207Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ioannis Arapakis and Luis A. Leiva. 2020. Learning Efficient Representations of Mouse Movements to Predict User Attention. SIGIR 2020 - Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (jul 2020), 1309–1318. https://doi.org/10.1145/3397271.3401031Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Belbergui Chaimaa, Elkamoun Najib, and Hilal Rachid. 2021. E-banking Overview: Concepts, Challenges and Solutions. Wireless Personal Communications 117, 2 (mar 2021), 1059–1078. https://doi.org/10.1007/S11277-020-07911-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Alexander Chan, Tzipora Halevi, and Nasir Memon. 2015. Leap Motion Controller for Authentication via Hand Geometry and Gestures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9190 (2015), 13–22. https://doi.org/10.1007/978-3-319-20376-8_2Google ScholarGoogle Scholar
  6. Penny Chong, Yuval Elovici, and Alexander Binder. 2020. User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. IEEE Transactions on Information Forensics and Security 15 (2020), 1086–1101. https://doi.org/10.1109/TIFS.2019.2930429Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shaveta Dargan and Munish Kumar. 2020. A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Systems with Applications 143 (apr 2020). https://doi.org/10.1016/J.ESWA.2019.113114Google ScholarGoogle Scholar
  8. Xing Ding, Changgen Peng, Hongfa Ding, Maoni Wang, Hui Yang, and Qinyong Yu. 2019. User identity authentication and identification based on multi-factor behavior features. In 2019 IEEE Globecom Workshops, GC Wkshps 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc.https://doi.org/10.1109/GCWkshps45667.2019.9024581Google ScholarGoogle ScholarCross RefCross Ref
  9. Priscila Morais Argôlo Bonfim Estrela, Robson de Oliveira Albuquerque, Dino Macedo Amaral, William Ferreira Giozza, and Rafael Timóteo de Sousa Júnior. 2021. A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications. Sensors 2021, Vol. 21, Page 4212 21, 12 (jun 2021), 4212. https://doi.org/10.3390/S21124212Google ScholarGoogle Scholar
  10. Suresh Giri, Jinfeng Su, George Zajko, and P. W.C. Prasad. 2020. Authentication method to secure cloud data centres using biometric technology. CITISIA 2020 - IEEE Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, Proceedings (nov 2020). https://doi.org/10.1109/CITISIA50690.2020.9371802Google ScholarGoogle ScholarCross RefCross Ref
  11. Athul Harilal, Flavio Toffalini, Ivan Homoliak, John Castellanos, Juan Guarnizo, Soumik Mondal, and Martín Ochoa. 2018. The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 9, 1 (mar 2018), 54–85. https://doi.org/10.22667/JOWUA.2018.03.31.054Google ScholarGoogle Scholar
  12. Elliu Huang, Fabio Di Troia, and Mark Stamp. 2021. Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication. (2021). arxiv:2110.14597v1Google ScholarGoogle Scholar
  13. Michal Hucko, Robert Moro, and Maria Bielikova. 2020. Confusion Detection Dataset of Mouse and Eye Movements. Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization(2020). https://doi.org/10.1145/3386392Google ScholarGoogle Scholar
  14. Peter Krátky and Daniela Chudá. 2018. Recognition of web users with the aid of biometric user model. Journal of Intelligent Information Systems 51, 3 (dec 2018), 621–646. https://doi.org/10.1007/S10844-018-0500-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pukar Maharjan, Kumar Shrestha, Trilochan Bhatta, Hyunok Cho, Chani Park, Md Salauddin, M. Toyabur Rahman, SM Sohel Rana, Sanghyun Lee, and Jae Y. Park. 2021. Keystroke Dynamics based Hybrid Nanogenerators for Biometric Authentication and Identification using Artificial Intelligence. Advanced Science 8, 15 (aug 2021), 2100711. https://doi.org/10.1002/ADVS.202100711Google ScholarGoogle ScholarCross RefCross Ref
  16. Israa Majeed Alsaadi. 2021. Study On Most Popular Behavioral Biometrics, Advantages, Disadvantages And Recent Applications : A Review. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 10 (2021), 1. https://doi.org/10.13140/RG.2.2.28802.09926Google ScholarGoogle Scholar
  17. Soumik Mondal and Patrick Bours. 2017. A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230 (mar 2017), 1–22. https://doi.org/10.1016/J.NEUCOM.2016.11.031Google ScholarGoogle Scholar
  18. Gunjan Pahuja and T. N. Nagabhushan. 2015. Biometric authentication and identification through behavioral biometrics: A survey. Proceedings - 2015 International Conference on Cognitive Computing and Information Processing, CCIP 2015 (apr 2015). https://doi.org/10.1109/CCIP.2015.7100681Google ScholarGoogle ScholarCross RefCross Ref
  19. Duc Minh Pham. 2018. Human Identification Using Neural Network-Based Classification of Periodic Behaviors in Virtual Reality. 25th IEEE Conference on Virtual Reality and 3D User Interfaces, VR 2018 - Proceedings (aug 2018), 657–658. https://doi.org/10.1109/VR.2018.8446529Google ScholarGoogle Scholar
  20. Himanshu Purohit and Pawan K. Ajmera. 2021. Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization. Cluster Computing 2021 (nov 2021), 1–20. https://doi.org/10.1007/S10586-021-03450-WGoogle ScholarGoogle Scholar
  21. Riseul Ryu, Soonja Yeom, Soo Hyung Kim, and David Herbert. 2021. Continuous Multimodal Biometric Authentication Schemes: A Systematic Review. IEEE Access 9(2021), 34541–34557. https://doi.org/10.1109/ACCESS.2021.3061589Google ScholarGoogle ScholarCross RefCross Ref
  22. Jesus Solano, Luis Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, and Martín Ochoa. 2021. Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications. International Journal of Information Security 20, 2 (apr 2021), 181–197. https://doi.org/10.1007/S10207-020-00510-X/FIGURES/13Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sudhakar Tanuja and Gavrilova Marina. 2020. Deep Learning for Multi-instance Biometric Privacy. ACM Transactions on Management Information Systems (TMIS) 12, 1 (dec 2020). https://doi.org/10.1145/3389683Google ScholarGoogle Scholar
  24. Joseph Teena, S. A. Kalaiselvan, S. U. Aswathy, R. Radhakrishnan, and A. R. Shamna. 2021. A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing 12, 6 (jun 2021), 6141–6149. https://doi.org/10.1007/S12652-020-02184-8/FIGURES/8Google ScholarGoogle Scholar
  25. Tim Van hamme, Enrique Argones Rua, Davy Preuveneers, and Wouter Joosen. 2021. On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Transactions on Information Forensics and Security 16 (2021), 5211–5224. https://doi.org/10.1109/TIFS.2021.3124735Google ScholarGoogle ScholarCross RefCross Ref
  26. Guangquan Zhao, Jin Yang, Jun Chen, Guang Zhu, Zedong Jiang, Xiaoyong Liu, Guangxing Niu, Zhong Lin Wang, and Bin Zhang. 2019. Keystroke Dynamics Identification Based on Triboelectric Nanogenerator for Intelligent Keyboard Using Deep Learning Method. Advanced Materials Technologies 4, 1 (jan 2019), 1800167. https://doi.org/10.1002/ADMT.201800167Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Security Aspects of Behavioral Biometrics for Strong User Authentication

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CompSysTech '22: Proceedings of the 23rd International Conference on Computer Systems and Technologies
      June 2022
      188 pages
      ISBN:9781450396448
      DOI:10.1145/3546118

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 August 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate241of492submissions,49%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format