AI-based user authentication reinforcement by continuous extraction of behavioral interaction features
نویسندگان
چکیده
Abstract In this work, we conduct an experiment to analyze the feasibility of a continuous authentication method based on monitorization users’ activity verify their identities through specific user profiles modeled via Artificial Intelligence techniques. order experiment, custom application was developed gather records in guided scenario where some predefined actions must be completed. This dataset has been anonymized and will available community. Additionally, public also used for benchmarking purposes so that our techniques could validated non-guided scenario. Such data were processed extract number key features train three different techniques: Support Vector Machines, Multi-Layer Perceptrons, Deep Learning approach. These demonstrated perform well both scenarios, being able authenticate users effective manner. Finally, rejection test conducted, system proposed tested using weighted sliding windows, impostor detected real environment when legitimate session is hijacked.
منابع مشابه
N-Gram-Based User Behavioral Model for Continuous User Authentication
We posit that each of us is unique in our use of computer systems. It is this uniqueness that we leverage in this paper to “continuously authenticate users” while they use web software. We build an n-gram model of each user’s interactions with software. This probabilistic model essentially captures the sequences and sub-sequences of user actions, their orderings, and temporal relationships that...
متن کاملUser Behavioral Modeling of Web-based Systems for Continuous User Authentication
Title of dissertation: USER BEHAVIORAL MODELING OF WEB-BASED SYSTEMS FOR CONTINUOUS USER AUTHENTICATION Leslie C. Milton, Doctor of Philosophy, 2015 Dissertation directed by: Professor Atif M. Memon Department of Computer Science University of Maryland, College Park Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication...
متن کاملRRLUFF: Ranking function based on Reinforcement Learning using User Feedback and Web Document Features
Principal aim of a search engine is to provide the sorted results according to user’s requirements. To achieve this aim, it employs ranking methods to rank the web documents based on their significance and relevance to user query. The novelty of this paper is to provide user feedback-based ranking algorithm using reinforcement learning. The proposed algorithm is called RRLUFF, in which the rank...
متن کاملContinuous User Authentication using Video-based Face Recognition
In order to ensure that a verified user is indeed the individual accessing a secured system over a period of time, it is necessary to constantly monitor the individual. Typical biometric systems recognize an individual at one particular time (e.g. login) and commonly require interaction with a device (e.g. using the keyboard). In this paper, we address the issue of continuous biometric verifica...
متن کاملBehavioral Biometrics for Smartphone User Authentication
Pervasive in nature and extensively used for a wide range of features, smartphone provides functionality such as social networking, online shopping, mobile gaming, private/group communication, etc. While using these services, a user has to provide private information such as account credentials, credit card details, etc., which are then stored on the device. This information, if lost, can resul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Neural Computing and Applications
سال: 2022
ISSN: ['0941-0643', '1433-3058']
DOI: https://doi.org/10.1007/s00521-022-07061-3