AI-based user authentication reinforcement by continuous extraction of behavioral interaction features

نویسندگان

چکیده

Abstract In this work, we conduct an experiment to analyze the feasibility of a continuous authentication method based on monitorization users’ activity verify their identities through specific user profiles modeled via Artificial Intelligence techniques. order experiment, custom application was developed gather records in guided scenario where some predefined actions must be completed. This dataset has been anonymized and will available community. Additionally, public also used for benchmarking purposes so that our techniques could validated non-guided scenario. Such data were processed extract number key features train three different techniques: Support Vector Machines, Multi-Layer Perceptrons, Deep Learning approach. These demonstrated perform well both scenarios, being able authenticate users effective manner. Finally, rejection test conducted, system proposed tested using weighted sliding windows, impostor detected real environment when legitimate session is hijacked.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

N-Gram-Based User Behavioral Model for Continuous User Authentication

We posit that each of us is unique in our use of computer systems. It is this uniqueness that we leverage in this paper to “continuously authenticate users” while they use web software. We build an n-gram model of each user’s interactions with software. This probabilistic model essentially captures the sequences and sub-sequences of user actions, their orderings, and temporal relationships that...

متن کامل

User Behavioral Modeling of Web-based Systems for Continuous User Authentication

Title of dissertation: USER BEHAVIORAL MODELING OF WEB-BASED SYSTEMS FOR CONTINUOUS USER AUTHENTICATION Leslie C. Milton, Doctor of Philosophy, 2015 Dissertation directed by: Professor Atif M. Memon Department of Computer Science University of Maryland, College Park Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication...

متن کامل

RRLUFF: Ranking function based on Reinforcement Learning using User Feedback and Web Document Features

Principal aim of a search engine is to provide the sorted results according to user’s requirements. To achieve this aim, it employs ranking methods to rank the web documents based on their significance and relevance to user query. The novelty of this paper is to provide user feedback-based ranking algorithm using reinforcement learning. The proposed algorithm is called RRLUFF, in which the rank...

متن کامل

Continuous User Authentication using Video-based Face Recognition

In order to ensure that a verified user is indeed the individual accessing a secured system over a period of time, it is necessary to constantly monitor the individual. Typical biometric systems recognize an individual at one particular time (e.g. login) and commonly require interaction with a device (e.g. using the keyboard). In this paper, we address the issue of continuous biometric verifica...

متن کامل

Behavioral Biometrics for Smartphone User Authentication

Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Neural Computing and Applications

سال: 2022

ISSN: ['0941-0643', '1433-3058']

DOI: https://doi.org/10.1007/s00521-022-07061-3