ABSTRACT
Efficient user identification and authentication are fundamental for securing access to systems processing sensitive data. This paper provides an analysis of current research in the field of user identification and identity verification with a focus on the behavioral biometrics supported by Machine Learning. It identifies the methods for user modeling with the potential of application in real-world scenarios such as strong authentication and fraud detection domain. This paper further elaborates on the current state-of-the-art approaches, feature extraction, and classification methods. We describe our experimental setup and provide an evaluation of our method in the selected deployment. We focus on user interactions in a controlled web environment. We performed classification experiments with the machine learning models on various datasets showing promising results in the robustness and proving relevance as a modern non-intrusive security measure.
- Mohammed Abuhamad, Ahmed Abusnaina, Daehun Nyang, and David Mohaisen. 2021. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet of Things Journal 8, 1 (jan 2021), 65–84. https://doi.org/10.1109/JIOT.2020.3020076 arxiv:2001.08578Google ScholarCross Ref
- Ahmed Awad E. Ahmed and Issa Traore. 2007. A new biometrie technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing 4, 3 (2007), 165–179. https://doi.org/10.1109/TDSC.2007.70207Google ScholarDigital Library
- Ioannis Arapakis and Luis A. Leiva. 2020. Learning Efficient Representations of Mouse Movements to Predict User Attention. SIGIR 2020 - Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval (jul 2020), 1309–1318. https://doi.org/10.1145/3397271.3401031Google ScholarDigital Library
- Belbergui Chaimaa, Elkamoun Najib, and Hilal Rachid. 2021. E-banking Overview: Concepts, Challenges and Solutions. Wireless Personal Communications 117, 2 (mar 2021), 1059–1078. https://doi.org/10.1007/S11277-020-07911-0Google ScholarDigital Library
- Alexander Chan, Tzipora Halevi, and Nasir Memon. 2015. Leap Motion Controller for Authentication via Hand Geometry and Gestures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9190 (2015), 13–22. https://doi.org/10.1007/978-3-319-20376-8_2Google Scholar
- Penny Chong, Yuval Elovici, and Alexander Binder. 2020. User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. IEEE Transactions on Information Forensics and Security 15 (2020), 1086–1101. https://doi.org/10.1109/TIFS.2019.2930429Google ScholarDigital Library
- Shaveta Dargan and Munish Kumar. 2020. A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Systems with Applications 143 (apr 2020). https://doi.org/10.1016/J.ESWA.2019.113114Google Scholar
- Xing Ding, Changgen Peng, Hongfa Ding, Maoni Wang, Hui Yang, and Qinyong Yu. 2019. User identity authentication and identification based on multi-factor behavior features. In 2019 IEEE Globecom Workshops, GC Wkshps 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc.https://doi.org/10.1109/GCWkshps45667.2019.9024581Google ScholarCross Ref
- Priscila Morais Argôlo Bonfim Estrela, Robson de Oliveira Albuquerque, Dino Macedo Amaral, William Ferreira Giozza, and Rafael Timóteo de Sousa Júnior. 2021. A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications. Sensors 2021, Vol. 21, Page 4212 21, 12 (jun 2021), 4212. https://doi.org/10.3390/S21124212Google Scholar
- Suresh Giri, Jinfeng Su, George Zajko, and P. W.C. Prasad. 2020. Authentication method to secure cloud data centres using biometric technology. CITISIA 2020 - IEEE Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, Proceedings (nov 2020). https://doi.org/10.1109/CITISIA50690.2020.9371802Google ScholarCross Ref
- Athul Harilal, Flavio Toffalini, Ivan Homoliak, John Castellanos, Juan Guarnizo, Soumik Mondal, and Martín Ochoa. 2018. The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 9, 1 (mar 2018), 54–85. https://doi.org/10.22667/JOWUA.2018.03.31.054Google Scholar
- Elliu Huang, Fabio Di Troia, and Mark Stamp. 2021. Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication. (2021). arxiv:2110.14597v1Google Scholar
- Michal Hucko, Robert Moro, and Maria Bielikova. 2020. Confusion Detection Dataset of Mouse and Eye Movements. Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization(2020). https://doi.org/10.1145/3386392Google Scholar
- Peter Krátky and Daniela Chudá. 2018. Recognition of web users with the aid of biometric user model. Journal of Intelligent Information Systems 51, 3 (dec 2018), 621–646. https://doi.org/10.1007/S10844-018-0500-0Google ScholarDigital Library
- Pukar Maharjan, Kumar Shrestha, Trilochan Bhatta, Hyunok Cho, Chani Park, Md Salauddin, M. Toyabur Rahman, SM Sohel Rana, Sanghyun Lee, and Jae Y. Park. 2021. Keystroke Dynamics based Hybrid Nanogenerators for Biometric Authentication and Identification using Artificial Intelligence. Advanced Science 8, 15 (aug 2021), 2100711. https://doi.org/10.1002/ADVS.202100711Google ScholarCross Ref
- Israa Majeed Alsaadi. 2021. Study On Most Popular Behavioral Biometrics, Advantages, Disadvantages And Recent Applications : A Review. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 10 (2021), 1. https://doi.org/10.13140/RG.2.2.28802.09926Google Scholar
- Soumik Mondal and Patrick Bours. 2017. A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230 (mar 2017), 1–22. https://doi.org/10.1016/J.NEUCOM.2016.11.031Google Scholar
- Gunjan Pahuja and T. N. Nagabhushan. 2015. Biometric authentication and identification through behavioral biometrics: A survey. Proceedings - 2015 International Conference on Cognitive Computing and Information Processing, CCIP 2015 (apr 2015). https://doi.org/10.1109/CCIP.2015.7100681Google ScholarCross Ref
- Duc Minh Pham. 2018. Human Identification Using Neural Network-Based Classification of Periodic Behaviors in Virtual Reality. 25th IEEE Conference on Virtual Reality and 3D User Interfaces, VR 2018 - Proceedings (aug 2018), 657–658. https://doi.org/10.1109/VR.2018.8446529Google Scholar
- Himanshu Purohit and Pawan K. Ajmera. 2021. Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization. Cluster Computing 2021 (nov 2021), 1–20. https://doi.org/10.1007/S10586-021-03450-WGoogle Scholar
- Riseul Ryu, Soonja Yeom, Soo Hyung Kim, and David Herbert. 2021. Continuous Multimodal Biometric Authentication Schemes: A Systematic Review. IEEE Access 9(2021), 34541–34557. https://doi.org/10.1109/ACCESS.2021.3061589Google ScholarCross Ref
- Jesus Solano, Luis Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, and Martín Ochoa. 2021. Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications. International Journal of Information Security 20, 2 (apr 2021), 181–197. https://doi.org/10.1007/S10207-020-00510-X/FIGURES/13Google ScholarDigital Library
- Sudhakar Tanuja and Gavrilova Marina. 2020. Deep Learning for Multi-instance Biometric Privacy. ACM Transactions on Management Information Systems (TMIS) 12, 1 (dec 2020). https://doi.org/10.1145/3389683Google Scholar
- Joseph Teena, S. A. Kalaiselvan, S. U. Aswathy, R. Radhakrishnan, and A. R. Shamna. 2021. A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing 12, 6 (jun 2021), 6141–6149. https://doi.org/10.1007/S12652-020-02184-8/FIGURES/8Google Scholar
- Tim Van hamme, Enrique Argones Rua, Davy Preuveneers, and Wouter Joosen. 2021. On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication. IEEE Transactions on Information Forensics and Security 16 (2021), 5211–5224. https://doi.org/10.1109/TIFS.2021.3124735Google ScholarCross Ref
- Guangquan Zhao, Jin Yang, Jun Chen, Guang Zhu, Zedong Jiang, Xiaoyong Liu, Guangxing Niu, Zhong Lin Wang, and Bin Zhang. 2019. Keystroke Dynamics Identification Based on Triboelectric Nanogenerator for Intelligent Keyboard Using Deep Learning Method. Advanced Materials Technologies 4, 1 (jan 2019), 1800167. https://doi.org/10.1002/ADMT.201800167Google ScholarCross Ref
Index Terms
- Security Aspects of Behavioral Biometrics for Strong User Authentication
Recommendations
Multi-factor biometrics for authentication: a false sense of security
MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and securityMulti-factor biometric authentications have been proposed recently to strengthen security and/or privacy of biometric systems in addition to enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply ...
Continuous Authentication Using Behavioral Biometrics
A continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint. In the process, a new trust model was created to enable continuous ...
Keystroke Biometric Systems for User Authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control, although they are gaining popularity. In recent years, keystroke biometric authentication has been an active area of research due to its low cost and ease of ...
Comments