Continuous User Authentication Using Machine Learning on Touch Dynamics

Author(s):  
Ştefania Budulan ◽  
Elena Burceanu ◽  
Traian Rebedea ◽  
Costin Chiru
Author(s):  
Amany Sarhan ◽  
Ahmed Ramadan

Nowadays, touchscreen mobile devices make up a larger share in the market, necessitating effective and robust methods to continuously authenticate touch-based device users. A classification framework is proposed that learns the touch behavior of a user and is able afterwards to authenticate users by monitoring their behavior in performing input touch actions. Two models of features are built; the low-level features (stoke-level) model or the high-level abstracted features (session-level) model. In building these models, two different methods for features selection and data classification were weighted features and PCA. Two classification algorithms were used; ANN and SVM. The experimental results indicate the possibility of continuous authentication for touch-input users with higher promises for session-level features than stroke-level features. Authors found out that using weighted features method and artificial neural networks in building the session-level model yields the most efficient and accurate behavioral biometric continuous user authentication.


2020 ◽  
Vol 39 (5) ◽  
pp. 6009-6020
Author(s):  
Yosef Ashibani ◽  
Qusay H. Mahmoud

Smartphones have now become ubiquitous for accessing and controlling home appliances in smart homes, a popular application of the Internet of Things. User authentication on smartphones is mostly achieved at initial access. However, without applying a continuous authentication process, the network will be susceptible to unauthorized users. This issue emphasizes the importance of offering a continuous authentication scheme to identify the current user of the device. This can be achieved by extracting information during smartphone usage, including application access patterns. In this paper, we present a flexible machine learning user authentication scheme for smart home networks based on smartphone usage. Considering that users may run their smartphone applications differently during different day time intervals as well as different days of the week, new features are extracted by considering this information. The scheme is evaluated on a real-world dataset for continuous user authentication. The results show that the presented scheme authenticates users with high accuracy.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4212
Author(s):  
Priscila Morais Argôlo Bonfim Estrela ◽  
Robson de Oliveira Albuquerque ◽  
Dino Macedo Amaral ◽  
William Ferreira Giozza ◽  
Rafael Timóteo de Sousa Júnior

As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, including those based on touch dynamics biometrics. These measures take into account the unique behavior of a person when interacting with touchscreen devices, thus hindering identitification fraud because it is hard to impersonate natural user behaviors. Behavioral biometric measures also balance security and usability because they are important for human interfaces, thus requiring a measurement process that may be transparent to the user. This paper proposes an improvement to Biotouch, a supervised Machine Learning-based framework for continuous user authentication. The contributions of the proposal comprise the utilization of multiple scopes to create more resilient reasoning models and their respective datasets for the improved Biotouch framework. Another contribution highlighted is the testing of these models to evaluate the imposter False Acceptance Error (FAR). This proposal also improves the flow of data and computation within the improved framework. An evaluation of the multiple scope model proposed provides results between 90.68% and 97.05% for the harmonic mean between recall and precision (F1 Score). The percentages of unduly authenticated imposters and errors of legitimate user rejection (Equal Error Rate (EER)) are between 9.85% and 1.88% for static verification, login, user dynamics, and post-login. These results indicate the feasibility of the continuous multiple-scope authentication framework proposed as an effective layer of security for banking applications, eventually operating jointly with conventional measures such as password-based authentication.


2021 ◽  
Author(s):  
Zi Wang ◽  
Sheng Tan ◽  
Linghan Zhang ◽  
Yili Ren ◽  
Zhi Wang ◽  
...  

Author(s):  
Sérgio Roberto de Lima e Silva Filho ◽  
Mauro Roisenberg

This chapter proposes an authentication methodology that is both inexpensive and non-intrusive and authenticates users continuously while using a computer keyboard. This proposed methodology uses neural network committee machines. The committee consists of several independent neural networks trained to recognize a behavioral biometric characteristic: user’s typing pattern. Continuous authentication prevents potential attacks when users leave their desks without logging out or locking their computer session. Some experiments were conducted to evaluate and to calibrate the authentication committee. Best results show that a 0% FAR and a 0.15% FRR can be achieved when different thresholds are used in the system for each user. In this proposed methodology, capture system does not need to concern about typing errors in the text. Another feature of this methodology is that new users can be easily added to the system, with no need to re-train all neural networks involved.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Fernando Nakayama ◽  
Paulo Lenz ◽  
Stella Banou ◽  
Michele Nogueira ◽  
Aldri Santos ◽  
...  

Smart health (s-health) is a vital topic and an essential research field today, supporting the real-time monitoring of user’s data by using sensors, either in direct or indirect contact with the human body. Real-time monitoring promotes changes in healthcare from a reactive to a proactive paradigm, contributing to early detection, prevention, and long-term management of health conditions. Under these new conditions, continuous user authentication plays a key role in protecting data and access control, once it focuses on keeping track of a user’s identity throughout the system operation. Traditional user authentication systems cannot fulfill the security requirements of s-health, because they are limited, prone to security breaches, and require the user to frequently authenticate by, e.g., a password or fingerprint. This interrupts the normal use of the system, being highly inconvenient and not user friendly. Also, data transmission in current authentication systems relies on wireless technologies, which are susceptible to eavesdropping during the pairing stage. Biological signals, e.g., electrocardiogram (ECG) and electroencephalogram (EEG), can offer continuous and seamless authentication bolstered by exclusive characteristics from each individual. However, it is necessary to redesign current authentication systems to encompass biometric traits and new communication technologies that can jointly protect data and provide continuous authentication. Hence, this article presents a novel biosignal authentication system, in which the photoplethysmogram (PPG) biosignal and a galvanic coupling (GC) channel lead to continuous, seamless, and secure user authentication. Furthermore, this article contributes to a clear organization of the state of the art on biosignal-based continuous user authentication systems, assisting research studies in this field. The evaluation of the system feasibility presents accuracy in keeping data integrity and up to 98.66% accuracy in the authentication process.


Sign in / Sign up

Export Citation Format

Share Document