BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System

被引:4
作者
Stylios, Ioannis [1 ]
Skalkos, Andreas [1 ]
Kokolakis, Spyros [1 ]
Karyda, Maria [1 ]
机构
[1] Univ Aegean, Mitilini, Greece
来源
COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS | 2022年 / 13106卷
关键词
Machine learning; Behavioral biometrics; Continuous authentication; Mobile devices; Multi-layer perceptron (MLP); CONTINUOUS USER AUTHENTICATION; MOBILE; BIOMETRICS;
D O I
10.1007/978-3-030-95484-0_10
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern, and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, Behavioral Biometrics (BB) Continuous Authentication (CA) technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), that is based on the user's keystroke dynamics, using a Multi-Layer Perceptron (MLP). Also, we introduce a new behavioral biometrics collection tool, and we propose a methodology for the selection of an appropriate set of behavioral biometrics. Our system achieved 97.18% Accuracy, 0.02% Equal Error Rate (EER), 97.2% True Acceptance Rate (TAR) and 0.02% False Acceptance Rate (FAR).
引用
收藏
页码:158 / 170
页数:13
相关论文
共 45 条
[1]  
Ahmed E.A., 2011, CONTINUOUS AUTHENTIC
[2]  
Alves D. D., 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM). Proceedings, P181, DOI 10.1109/CIBIM.2014.7015461
[3]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026
[4]  
Androulidakis I, 2009, ELE COM ENG, P25
[5]  
[Anonymous], 2010, P 4 USENIX C OFF TEC
[6]  
Arslan O.., 2007, 11 TURK HAR BIL TEKN
[7]   A changeable personal identification number-based keystroke dynamics authentication system on smart phones [J].
Chang, Ting-Yi ;
Tsai, Cheng-Jung ;
Tsai, Wang-Jui ;
Peng, Chun-Cheng ;
Wu, Han-Sing .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) :2674-2685
[8]  
Cherifi F., 2010, Behavioral Biometrics for Human Identification: Intelligent Applications (IGI), P57
[9]   Authenticating mobile phone users using keystroke analysis [J].
Clarke, N. L. ;
Furnell, S. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (01) :1-14
[10]   Authentication of users on mobile telephones - A survey of attitudes and practices [J].
Clarke, NL ;
Furnell, SM .
COMPUTERS & SECURITY, 2005, 24 (07) :519-527