ACTIVE LINGUISTIC AUTHENTICATION USING REAL-TIME STYLOMETRIC EVALUATION FOR MULTI-MODAL DECISION FUSION

被引:0
作者
Stolerman, Ariel
Fridman, Alex
Greenstadt, Rachel
Brennan, Patrick
Juola, Patrick
机构
来源
ADVANCES IN DIGITAL FORENSICS X | 2014年 / 433卷
关键词
Active authentication; stylometry; authorship verification; AUTHORSHIP; CLASSIFICATION; VERIFICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Active authentication is the process of continuously verifying a user based on his/her ongoing interactions with a computer. Forensic stylometry is the study of linguistic style applied to author (user) identification. This paper evaluates the Active Linguistic Authentication Dataset, collected from users working individually in an office environment over a period of one week. It considers a battery of stylometric modalities as a representative collection of high-level behavioral biometrics. While a previous study conducted a partial evaluation of the dataset with data from fourteen users, this paper considers the complete dataset comprising data from 67 users. Another significant difference is in the type of evaluation: instead of using day-based or data-based (number-of-characters) windows for classification, the evaluation employs time-based, overlapping sliding windows. This tests the ability to produce authentication decisions every 10 to 60 seconds, which is highly applicable to real-world active security systems. Sensor evaluation is conducted via cross-validation, measuring the false acceptance and false rejection rates (FAR/FRR). The results demonstrate that, under realistic settings, stylometric sensors perform with considerable effectiveness down to 0/0.5 FAR/FRR for decisions produced every 60 seconds and available 95% of the time.
引用
收藏
页码:165 / 183
页数:19
相关论文
共 43 条
[1]   Applying authorship analysis to extremist-group web forum messages [J].
Abbasi, A ;
Chen, HC .
IEEE INTELLIGENT SYSTEMS, 2005, 20 (05) :67-75
[2]   Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace [J].
Abbasi, Ahmed ;
Chen, Hsinchun .
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2008, 26 (02)
[3]   A new biometric technology based on mouse dynamics [J].
Ahmed, Ahmed Awad E. ;
Traore, Issa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (03) :165-179
[4]  
[Anonymous], 2005, International Journal of Digital Evidence
[5]  
[Anonymous], 1995, ERR RED DEC TREE ENS
[6]  
[Anonymous], 1964, Inference and disputed authorship: The Federalist
[7]  
Argamon Shlomo, 2007, First Monday, V12
[8]   Automatically Profiling the Author of an Anonymous Text [J].
Argamon, Shlomo ;
Koppel, Moshe ;
Pennebarker, James W. ;
Schler, Jonathan .
COMMUNICATIONS OF THE ACM, 2009, 52 (02) :119-123
[9]  
Bakelman N., 2012, P STUD FAC RES DAY S
[10]  
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272