A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking

被引:3
作者
Alzubaidi, Abdulaziz [1 ]
Roy, Swarup [2 ,3 ]
Kalita, Jugal [4 ]
机构
[1] Umm Alqura Univ, Dept Comp Sci, Al Qunfudah 28821, Saudi Arabia
[2] Sikkim Univ, Dept Comp Applicat, Gangtok 737102, India
[3] North Eastern Hill Univ, Dept Informat Technol, Shillong 793022, Meghalaya, India
[4] Univ Colorado, Dept Comp Sci, Colorado Springs, CO 80918 USA
关键词
Fraudulent user; Machine learning; Classification; Behavioral biometric; Smartphone security; HIDDEN MARKOV-MODELS; MOBILE DEVICES; CLASSIFIER; FOREST;
D O I
10.1016/j.dcan.2018.09.001
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms. Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices. Machine-learning-based frameworks are effective for active authentication. However, the success of any machine-learning-based techniques depends highly on the relevancy of the data in hand for training. In addition, the training time should be very efficient. Keeping in view both issues, we've explored a novel fraudulent user detection method based solely on the app usage patterns of legitimate users. We hypothesized that every user has a unique pattern hidden in his/her usage of apps. Motivated by this observation, we've designed a way to obtain training data, which can be used by any machine learning model for effective authentication. To achieve better accuracy with reduced training time, we removed data instances related to any specific user from the training samples which did not contain any apps from the user-specific priority list. An information theoretic app ranking scheme was used to prepare a user-targeted apps priority list. Predictability of each instance related to a candidate app was calculated by using a knockout approach. Finally, a weighted rank was calculated for each app specific to every user. Instances with low ranked apps were removed to derive the reduced training set. Two datasets as well as seven classifiers for experimentation revealed that our reduced training data significantly lowered the prediction error rates in the context of classifying the legitimate user of a smartphone.
引用
收藏
页码:205 / 213
页数:9
相关论文
共 31 条
[1]  
Alzubaidi A., 2017, INT WORKSH SEC PRIV, P695
[2]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026
[3]  
[Anonymous], 2016, KDD16 P 22 ACM, DOI DOI 10.1145/2939672.2939785
[4]  
Bhargava N., 2013, Proceedings of International Journal of Advanced Research in Computer Science and Software Engineering, V3
[5]   OPTIMAL DATA FUSION IN MULTIPLE SENSOR DETECTION SYSTEMS [J].
CHAIR, Z ;
VARSHNEY, PK .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1986, 22 (01) :98-101
[6]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[7]   Inferring friendship network structure by using mobile phone data [J].
Eagle, Nathan ;
Pentland, Alex ;
Lazer, David .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2009, 106 (36) :15274-15278
[8]  
Falaki Hossein., 2011, P 6 INT WORKSHOP MOB, P25, DOI DOI 10.1145/1999916.1999923
[9]  
Feng T, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P451, DOI 10.1109/THS.2012.6459891
[10]   Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location [J].
Fridman, Lex ;
Weber, Steven ;
Greenstadt, Rachel ;
Kam, Moshe .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :513-521