Continuous Authentication in Computers

2013 ◽  
pp. 268-293
Author(s):  
Harini Jagadeesan ◽  
Michael S. Hsiao

In the Internet age, identity theft is a major security issue because contemporary authentication systems lack adequate mechanisms to detect and prevent masquerading. This chapter discusses the current authentication systems and identifies their limitations in combating masquerading attacks. Analysis of existing authentication systems reveals the factors to be considered and the steps necessary in building a good continuous authentication system. As an example, we present a continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. It employs a novel heuristic based on keyboard and mouse attributes to decipher the behavioral pattern of each individual user on the system. In the re-authentication process, the current behavior of user is compared with stored “expected” behavior. If user behavior deviates from expected behavior beyond an allowed threshold, system logs the user out of the current session, thereby preventing imposters from misusing the system. Experimental results show that the proposed methodology improves the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively. At the end of this chapter, the reader is expected to understand the dimensions involved in creating a computer based continuous authentication system and is able to frame a robust continual re-authentication system with a high degree of accuracy.

Author(s):  
Harini Jagadeesan ◽  
Michael S. Hsiao

In the Internet age, identity theft is a major security issue because contemporary authentication systems lack adequate mechanisms to detect and prevent masquerading. This chapter discusses the current authentication systems and identifies their limitations in combating masquerading attacks. Analysis of existing authentication systems reveals the factors to be considered and the steps necessary in building a good continuous authentication system. As an example, we present a continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. It employs a novel heuristic based on keyboard and mouse attributes to decipher the behavioral pattern of each individual user on the system. In the re-authentication process, the current behavior of user is compared with stored “expected” behavior. If user behavior deviates from expected behavior beyond an allowed threshold, system logs the user out of the current session, thereby preventing imposters from misusing the system. Experimental results show that the proposed methodology improves the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively. At the end of this chapter, the reader is expected to understand the dimensions involved in creating a computer based continuous authentication system and is able to frame a robust continual re-authentication system with a high degree of accuracy.


2018 ◽  
Vol 6 (3) ◽  
pp. 1
Author(s):  
OMOROGIUWA O. S. ◽  
AZIKEN G. O. ◽  
◽  

This study aims to test an interactive pedagogical tool using a computer-based learning approach. The purpose of building Multiple Intelligences Activities Flip Module is to increase students’ potentials through their multiple intelligences. The true-experimental study design is used and the samples are randomly selected as control and treatment groups. Pre and post tests are used to measure the effectiveness of this interactive flip module in relations to multiple intelligences significant differences. The findings of the study reveal that the interactive Multiple Intelligences Activity flip module has a high degree of reliability whereby the average measure for Intra-class Correlation Coefficient is .771 with a 95% confidence interval from .520 to .931 (F(9,486)= 4.644, p<.000). Based on MANCOVA test analysis, the researchers have rejected the null hypothesis. The study has demonstrated that the Multiple Intelligence Activity flip module has increased the scores of multiple intelligences tests for treatment groups.


2013 ◽  
pp. 389-409
Author(s):  
P. Daphne Tsatsoulis ◽  
Aaron Jaech ◽  
Robert Batie ◽  
Marios Savvides

Conventional access control solutions rely on a single authentication to verify a user’s identity but do nothing to ensure the authenticated user is indeed the same person using the system afterwards. Without continuous monitoring, unauthorized individuals have an opportunity to “hijack” or “tailgate” the original user’s session. Continuous authentication attempts to remedy this security loophole. Biometrics is an attractive solution for continuous authentication as it is unobtrusive yet still highly accurate. This allows the authorized user to continue about his routine but quickly detects and blocks intruders. This chapter outlines the components of a multi-biometric based continuous authentication system. Our application employs a biometric hand-off strategy where in the first authentication step a strong biometric robustly identifies the user and then hands control to a less computationally intensive face recognition and tracking system that continuously monitors the presence of the user. Using multiple biometrics allows the system to benefit from the strengths of each modality. Since face verification accuracy degrades as more time elapses between the training stage and operation time, our proposed hand-off strategy permits continuous robust face verification with relatively simple and computationally efficient classifiers. We provide a detailed evaluation of verification performance using different pattern classification algorithms and show that the final multi-modal biometric hand-off scheme yields high verification performance.


Author(s):  
Varaprasad Rao M ◽  
Vishnu Murthy G

Decision Supports Systems (DSS) are computer-based information systems designed to help managers to select one of the many alternative solutions to a problem. A DSS is an interactive computer based information system with an organized collection of models, people, procedures, software, databases, telecommunication, and devices, which helps decision makers to solve unstructured or semi-structured business problems. Web mining is the application of data mining techniques to discover patterns from the World Wide Web. Web mining can be divided into three different types – Web usage mining, Web content mining and Web structure mining. Recommender systems (RS) aim to capture the user behavior by suggesting/recommending users with relevant items or services that they find interesting in. Recommender systems have gained prominence in the field of information technology, e-commerce, etc., by inferring personalized recommendations by effectively pruning from a universal set of choices that directed users to identify content of interest.


Author(s):  
Enrico Schiavone ◽  
Andrea Ceccarelli ◽  
Ariadne Carvalho ◽  
Andrea Bondavalli

2012 ◽  
Vol 65 (3) ◽  
pp. 549-559 ◽  
Author(s):  
Wei-Kuo Tseng ◽  
Michael A. Earle ◽  
Jiunn-Liang Guo

In this paper, equations are established to solve problems of Rhumb Line Sailing (RLS) on an oblate spheroid. Solutions are provided for both the inverse problem and the direct problem, thereby providing a complete solution to RLS. Development of these solutions was achieved in part by means of computer based symbolic algebra. The inverse solution described attains a high degree of accuracy for distance and azimuth. The direct solution has been obtained from a solution for latitude in terms of distance derived with the introduction of an inverse series expansion of meridian arc-length via the rectifying latitude. Also, a series to determine latitude at any longitude has been derived via the conformal latitude. This was achieved through application of Hermite's Interpolation Scheme or the Lagrange Inversion Theorem. Numerical examples show that the algorithms are very accurate and that the differences between original data and recovered data after applying the inverse or direct solution of RLS to recover the data calculated by the direct or inverse solution are very small. It reveals that the algorithms provided here are suitable for programming implementation and can be applied in the areas of maritime routing and cartographical computation in Graphical Information System (GIS) and Electronic Chart Display and Information System (ECDIS) environments.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Saleh M. Al-Saleem ◽  
Hanif Ullah

Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.


Sign in / Sign up

Export Citation Format

Share Document