Continuous User Authentication on Touchscreen Using Behavioral Biometrics Utilizing Machine Learning Approaches

Continuous User Authentication on Touchscreen Using Behavioral Biometrics Utilizing Machine Learning Approaches

Amany Sarhan, Ahmed Ramadan
Copyright: © 2020 |Pages: 39
DOI: 10.4018/978-1-7998-2701-6.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Nowadays, touchscreen mobile devices make up a larger share in the market, necessitating effective and robust methods to continuously authenticate touch-based device users. A classification framework is proposed that learns the touch behavior of a user and is able afterwards to authenticate users by monitoring their behavior in performing input touch actions. Two models of features are built; the low-level features (stoke-level) model or the high-level abstracted features (session-level) model. In building these models, two different methods for features selection and data classification were weighted features and PCA. Two classification algorithms were used; ANN and SVM. The experimental results indicate the possibility of continuous authentication for touch-input users with higher promises for session-level features than stroke-level features. Authors found out that using weighted features method and artificial neural networks in building the session-level model yields the most efficient and accurate behavioral biometric continuous user authentication.
Chapter Preview
Top

Introduction

With the increasing popularity of mobile computing devices and their applications that access secure services such as banking and other transactions, protecting user data on mobile devices is becoming more and more important day after day. Digital technology is now just a part of life. From online shopping to net banking, government transactions and business infrastructure, securing this large amount of data plays a vital role. Data can be secured using various hardware and software technologies (Karnan et al.'s, 2011), (Ouaguid et al.'s, 2018) and (Olakanmi & Dada, A. 2019).

Some common tools are antivirus, encryption, firewalls, two-factor authentication, software patches, updates, etc. Many people have a common misconception that data security is important only for big organizations, governments and businesses and they are only the target of data attackers. Data security is not just important for businesses or governments. Your computer, tablet, and mobile devices could be the next target. Usually, common users get targeted by attackers for their sensitive information, such as their credit card details, banking details, passwords, etc. All the previous lead to the existence of the most famous authentication scheme to protect user data and privacy that is password scheme (Mahfouz et al., 2017, Feng et al., 2012, Zhao et al., 2014, Jouini & Rabai, 2016).

Current applications maintain the privacy of user sensitive data by supporting user authentication at every login. Most mobile device applications today enforce security using traditional text-based password schemes to authenticate a user. However, users often choose weak passwords to make the login process more easy and quick (Jain et al., 2004). This is especially true with touch devices that are rapidly becoming ubiquitous. Findlater et al. (2011) have shown that the speed of typing on fiash glass is 31% slower than a physical keyboard. This typically leads to a shorter password chosen by users to shorten their login time. Choosing the appropriate password puts the user in a dilemma between using an easy-to-remember password and, at the same time, safe password so, most users sacrifice security to guarantee easy and quick login process which is the most frequent action done by touch input mobile devices so there was an urgent need to find other alternative authentication methods to solve this dilemma and give the user a more quick and easy login experience and at the same time doesn't make the user to sacrifice security (Frank et al., 2013).

Other authentication methods that could be better alternatives to a password authentication scheme, such as graphical patterns are most encouraging, but also are vulnerable to attacks, such as trying to discover the residues left on the touchscreen of the device after entering the same pattern many times. In addition to the previously mentioned, the main limitation of traditional security systems is that the user is only authenticated once at the beginning of the session. This authentication process is not performed until the next time the device needs to be unlocked (Karnan et al., 2011). All these problems and limitations lead to using some type of implicit and continuous authentication method to overcome these limitations. According to that, the authentication method needs to be continuous to overcome any attempt to access secured data illegally (Gianni et al., 2017). These methods are not valid in many situations like authentication of a student in an online exam.

Key Terms in this Chapter

Keystroke: A keystroke means the pressing of a key either on a keyboard or on a touchscreen.

Single-touch and Multi-touch Stroke: A stroke is a sequence of touch data that begins with touching the screen and ends with lifting the finger. A single-touch means touching a single point on the touchscreen. A multi-touch means touching multiple points on the touchscreen to achieve a task.

Principal Component Analysis (PCA): It is an algorithm to simplify the complexity in high- dimensional data while retaining trends and patterns by transforming the data into fewer dimensions, which act as summaries of features.

Keystroke Dynamics: Measurements of the speed, frequency of characters, other data related to pressing a key.

Traditional authentication schemes: Conventional methods of verification of the legitimacy of the system user, i.e. password, pin code or graphical.

Complete Chapter List

Search this Book:
Reset