ABSTRACT
The ubiquity of mobile devices nowadays necessitates securing the apps and user information stored therein. However, existing one-time entry-point authentication mechanisms and enhanced security mechanisms such as Multi-Factor Authentication (MFA) are prone to a wide vector of attacks. Furthermore, MFA also introduces friction to the user experience. Therefore, what is needed is continuous authentication that once passing the entry-point authentication, will protect the mobile devices on a continuous basis by confirming the legitimate owner of the device and locking out detected impostor activities. Hence, more research is needed on the dynamic methods of mobile security such as behavioral biometrics-based continuous authentication, which is cost-effective and passive as the data utilized to authenticate users are logged from the phone's sensors. However, currently, there are not many mobile authentication datasets to perform benchmarking research. In this work, we share two novel mobile datasets (Clarkson University (CU) Mobile datasets I and II) consisting of multi-modality behavioral biometrics data from 49 and 39 users respectively (88 users in total). Each of our datasets consists of modalities such as swipes, keystrokes, acceleration, gyroscope, and pattern-tracing strokes. These modalities are collected when users are filling out a registration form in sitting both as genuine and impostor users. To exhibit the usefulness of the datasets, we have performed initial experiments on selected individual modalities from the datasets as well as the fusion of simultaneously available modalities.
Supplemental Material
- Amith K Belman, Li Wang, SS Iyengar, Pawel Sniatala, Robert Wright, Robert Dora, Jacob Baldwin, Zhanpeng Jin, and Vir V Phoha. 2019. Insights from BB-MAS--A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone. arXiv:1912.02736 (2019).Google Scholar
- Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2012. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security , Vol. 8 (2012).Google ScholarDigital Library
- Upal Mahbub, Sayantan Sarkar, Vishal M Patel, and Rama Chellappa. 2016. Active user authentication for smartphones: A challenge data set and benchmark results. In 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS). IEEE.Google ScholarDigital Library
- Karthik Nandakumar, Yi Chen, Sarat C Dass, and Anil Jain. 2007. Likelihood ratio-based biometric score fusion. IEEE transactions on pattern analysis and machine intelligence , Vol. 30 (2007).Google Scholar
- Michail D Papamichail, Kyriakos C Chatzidimitriou, Thomas Karanikiotis, Napoleon-Christos I Oikonomou, Andreas L Symeonidis, and Sashi K Saripalle. 2019. BrainRun: A behavioral biometrics dataset towards continuous implicit authentication. Data , Vol. 4 (2019).Google Scholar
- Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers, and Abbie Barbir. 2022. Evaluating multi-modal mobile behavioral biometrics using public datasets. Computers & Security , Vol. 121 (2022).Google ScholarDigital Library
- Abdul Serwadda, Vir V Phoha, and Zibo Wang. 2013. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS). IEEE.Google Scholar
- Zdevn ka Sitová , Jaroslav vS edve nka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S Balagani. 2015. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security , Vol. 11 (2015).Google Scholar
- Giuseppe Stragapede, Ruben Vera-Rodriguez, Ruben Tolosana, and Aythami Morales. 2022. BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation. Pattern Recognition (2022).Google Scholar
- Ahmed Anu Wahab, Daqing Hou, Stephanie Schuckers, and Abbie Barbir. 2022. Securing account recovery mechanism on desktop computers and mobile phones with keystroke dynamics. SN Computer Science, Vol. 3, 5 (2022), 360. ioGoogle ScholarDigital Library
Index Terms
- Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paper
Recommendations
A Review of Continuous Authentication Using Behavioral Biometrics
SEEDA-CECNSM '16: Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media ConferenceThe present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are ...
Continuous Authentication Using Behavioral Biometrics
A continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint. In the process, a new trust model was created to enable continuous ...
Privacy-preserving continuous authentication using behavioral biometrics
AbstractContinuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about user activities, behaviors, and other demographic information, which causes privacy concerns. In ...
Comments