Taxonomy of Behavioural Biometrics

This chapter presents a taxonomy of the latest behavioural biometrics, including some future oriented approaches. Current research in the field is examined and analyzed along with the features used to describe different types of behaviour. After comparing accuracy rates for verification of users using dif ferent behavioural biometric approaches, researchers address privacy issues which arise or might arise in the future with the use of behavioural biometrics. Finally, generalized properties of behaviour are addressed as well as influence of environmental factors on observed behaviour and potential directions for future research in behavioural biometrics.

[1]  Peter John Graham,et al.  The new wave , 1968 .

[2]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[3]  Réjean Plamondon,et al.  Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..

[4]  Karl N. Levitt,et al.  Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.

[5]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[6]  Juergen Luettin,et al.  Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.

[7]  Mark E. Oxley,et al.  Cohort selection and word grammar effects for speaker recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[8]  Peter L. Williams,et al.  Gray's Anatomy: The Anatomical Basis of Medicine and Surgery , 1996 .

[9]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[10]  Sridha Sridharan,et al.  Person authentication using lip information , 1997, TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162).

[11]  Juergen Luettin,et al.  Acoustic-labial speaker verification , 1997, Pattern Recognit. Lett..

[12]  V. S. Nalwa Automatic on-line signature verification , 1997 .

[13]  Carla E. Brodley,et al.  Detecting the Abnormal: Machine Learning in Computer Security , 1997 .

[14]  R. Wilder,et al.  Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..

[15]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[16]  Roland Auckenthaler,et al.  Lip signatures for automatic person recognition , 1999, 1999 IEEE Third Workshop on Multimedia Signal Processing (Cat. No.99TH8451).

[17]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[18]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[19]  Efstathios Stamatatos,et al.  Automatic Authorship Attribution , 1999, EACL.

[20]  Barak A. Pearlmutter,et al.  Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[21]  Terran Lane,et al.  An Application of Machine Learning to Anomaly Detection , 1999 .

[22]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[23]  Seppo Puuronen,et al.  Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events , 1999, Recent Advances in Intrusion Detection.

[24]  Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report , 2000, Recent Advances in Intrusion Detection.

[25]  Tomohiro Yamamura,et al.  A Driver Behavior Recognition Method Based on a Driver Model Framework , 2000 .

[26]  Ivan Koychev,et al.  Adaptation to Drifting User's Interests , 2000 .

[27]  Alex Pentland,et al.  Graphical models for driver behavior recognition in a SmartCar , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).

[28]  Tieniu Tan,et al.  Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[29]  David L. Dowe,et al.  Inductive Inference of Chess Player Strategy , 2000, PRICAI.

[30]  Nong Ye,et al.  A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .

[31]  Jude W. Shavlik,et al.  Learning users' interests by unobtrusively observing their normal behavior , 2000, IUI '00.

[32]  Marc Dacier,et al.  Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.

[33]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[34]  A. Karr,et al.  Computer Intrusion: Detecting Masquerades , 2001 .

[35]  Neil J. Henderson,et al.  Polymer thick-film sensors: possibilities for smartcard biometrics , 2001 .

[36]  David A. Wagner,et al.  Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[37]  Olga Papaemmanouil,et al.  Dynamic Recommendations in Internet Retailing , 2001, ECIS.

[38]  Daniel J. Ragsdale,et al.  A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[39]  Kuldip K. Paliwal,et al.  Information fusion for robust speaker verification , 2001, INTERSPEECH.

[40]  Ioannis Pitas,et al.  Recent advances in biometric person authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[41]  Danielle Liu,et al.  Application profiling of IP traffic , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..

[42]  Sushil Jajodia,et al.  Enhancing Profiles for Anomaly Detection Using Time Granularities , 2002, J. Comput. Secur..

[43]  Diane Lambert,et al.  Detecting fraud in the real world , 2002 .

[44]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[45]  Neil M. White,et al.  Sensing pressure for authentication , 2002 .

[46]  Salvatore J. Stolfo,et al.  Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.

[47]  Larry S. Davis,et al.  Person identification using automatic height and stride estimation , 2002, Object recognition supported by user interaction for service robots.

[48]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[49]  Roy A. Maxion,et al.  Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.

[50]  Stephen G. MacDonell,et al.  Software Forensics: Extending Authorship Analysis Techniques to Computer Programs , 2002 .

[51]  Jan Ramon,et al.  Opponent modeling by analysing play , 2002 .

[52]  Ralf Steinmetz,et al.  Biometric applications based on handwriting , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[53]  Gregory R. Ganger,et al.  On the Feasibility of Intrusion Detection Inside Workstation Disks , 2003 .

[54]  Yuxin Ding,et al.  Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..

[55]  S. Gosling,et al.  PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES The Do Re Mi’s of Everyday Life: The Structure and Personality Correlates of Music Preferences , 2003 .

[56]  Arslan Brömme,et al.  Multifactor Biometric Sketch Authentication , 2003, BIOSIG.

[57]  C. Manikopoulos,et al.  Investigation of neural network classification of computer network attacks , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..

[58]  Kenneth A. Kaufman,et al.  An Application of Symbolic Learning to Intrusion Detection: Preliminary Results from the LUS Methodology , 2003 .

[59]  Ana L. N. Fred,et al.  An Identity Authentication System Based On Human Computer Interaction Behaviour , 2003, PRIS.

[60]  Arslan Brömme,et al.  Using an Active Shape Structural Model for Biometric Sketch Recognition , 2003, DAGM-Symposium.

[61]  Christoph C. Michael Finding the vocabulary of program behavior data for anomaly detection , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[62]  A. Bromme A classification of biometric signatures , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[63]  Geoffrey H. Kuenning,et al.  Detecting insider threats by monitoring system call activity , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[64]  Weibo Gong,et al.  Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..

[65]  Craig A. N. Soules,et al.  Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior , 2003, USENIX Security Symposium.

[66]  Vern Paxson,et al.  Enhancing byte-level network intrusion detection signatures with context , 2003, CCS '03.

[67]  Hyeyoung Park,et al.  A New Similarity Measure Based on Intraclass Statistics for Biometrie Systems , 2003 .

[68]  Raymond N. J. Veldhuis,et al.  Grip-Pattern Recognition for Smart Guns , 2003 .

[69]  Wing Hong Lau,et al.  Person authentication using ASM based lip shape and intensity information , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[70]  J.D.S. da Silva,et al.  A neural network application for attack detection in computer networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[71]  Larry Rudolph,et al.  Passdoodles; a Lightweight Authentication Method , 2004 .

[72]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[73]  Alexey Tsymbal,et al.  The problem of concept drift: definitions and related work , 2004 .

[74]  Tracy L. Westeyn,et al.  Recognizing song-based blink patterns: applications for restricted and universal access , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[75]  Ana L. N. Fred,et al.  A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.

[76]  Moshe Koppel,et al.  Authorship verification as a one-class classification problem , 2004, ICML.

[77]  Malcolm Crompton,et al.  Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy? , 2004 .

[78]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[79]  Zygmunt Ciota Speaker verification for multimedia application , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[80]  Rama Chellappa,et al.  Identification of humans using gait , 2004, IEEE Transactions on Image Processing.

[81]  Anil K. Jain,et al.  Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.

[82]  Hans van Halteren,et al.  Linguistic Profiling for Authorship Recognition and Verification , 2004, ACL.

[83]  Hüseyin Abut,et al.  Biometric identification using driving behavioral signals , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[84]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[85]  Siwei Lyu,et al.  A digital technique for art authentication , 2004, Proc. Natl. Acad. Sci. USA.

[86]  Karen Renaud Quantifying the quality of web authentication mechanisms , 2004 .

[87]  Pieter H. Hartel,et al.  Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.

[88]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[89]  Karen Renaud,et al.  Quantifying the quality of web authentication mechanisms: a usability perspective , 2004 .

[90]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[91]  Xiaofan Lin,et al.  Phoneme-less hierarchical accent classification , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[92]  Mark S. Nixon,et al.  On gait as a biometric: Progress and prospects , 2004, 2004 12th European Signal Processing Conference.

[93]  Anil K. Jain,et al.  Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.

[94]  Brian A. Jacob,et al.  To Catch a Cheat. , 2004 .

[95]  Gaurav Gupta,et al.  Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol , 2004, Int. J. Digit. EVid..

[96]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[97]  Abdulmotaleb El-Saddik,et al.  Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns , 2005, MULTIMEDIA '05.

[98]  Julie Thorpe,et al.  Pass-thoughts: authenticating with our minds , 2005, NSPW '05.

[99]  Paola Britos,et al.  Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.

[100]  Mohammad Banikazemi,et al.  Storage-based intrusion detection for storage area networks (SANs) , 2005, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05).

[101]  Dmitry V. Novikov Neural networks to intrusion detection , 2005 .

[102]  I. Traore,et al.  Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[103]  Klaus Mueller,et al.  Dynamic Approach for Face Recognition Using Digital Image Skin Correlation , 2005, AVBPA.

[104]  Giancarlo Ruffo,et al.  Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.

[105]  Sung-Hyuk Cha,et al.  Long-Text Keystroke Biometric Applications over the Internet , 2005, MLMTA.

[106]  Akinori Ito,et al.  Smile and laughter recognition using speech processing and face recognition from conversation video , 2005, 2005 International Conference on Cyberworlds (CW'05).

[107]  A. El Saddik,et al.  Automatic Identification of Participants in Haptic Systems , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.

[108]  Issa Traoré,et al.  Detecting Computer Intrusions Using Behavioral Biometrics , 2005, PST.

[109]  Zhen Liu,et al.  Dynamic learning of automata from the call stack log for anomaly detection , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[110]  Venu Govindaraju,et al.  Use of behavioral biometrics in intrusion detection and online gaming , 2006, SPIE Defense + Commercial Sensing.

[111]  A. Murat Tekalp,et al.  Multimodal person recognition for human-vehicle interaction , 2006, IEEE Multimedia.

[112]  R.V. Yampolskiy,et al.  ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION , 2006, 2006 IEEE Long Island Systems, Applications and Technology Conference.

[113]  Anil K. Jain,et al.  Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[114]  Tzi-cker Chiueh,et al.  Accurate and Automated System Call Policy-Based Intrusion Prevention , 2006, International Conference on Dependable Systems and Networks (DSN'06).

[115]  Shahram Latifi,et al.  A Survey of Unimodal Biometric Methods , 2006, Security and Management.

[116]  Yoohwan Kim,et al.  Baseline Profile Stability for Network Anomaly Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[117]  Richard Youmaran,et al.  Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[118]  Leon Reznik,et al.  Anomaly Detection Based Intrusion Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[119]  Hsin-Min Wang,et al.  Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[120]  Mohammad Bagher Shamsollahi,et al.  Person Identification by Using AR Model for EEG Signals , 2007 .

[121]  A. Garg,et al.  Profiling Users in GUI Based Systems for Masquerade Detection , 2006, 2006 IEEE Information Assurance Workshop.

[122]  Dongsheng Wang,et al.  Research on object-storage-based intrusion detection , 2006, 12th International Conference on Parallel and Distributed Systems - (ICPADS'06).

[123]  Sung-Hyuk Cha,et al.  Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study , 2006 .

[124]  José del R. Millán,et al.  Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[125]  R.V. Yampolskiy Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[126]  Roman V. Yampolskiy Human Computer Interaction Based Intrusion Detection , 2007, Fourth International Conference on Information Technology (ITNG'07).

[127]  Venu Govindaraju,et al.  Direct and Indirect Human Computer Interaction Based Biometrics , 2007, J. Comput..

[128]  Roman V. Yampolskiy Secure Network Authentication with PassText , 2007, Fourth International Conference on Information Technology (ITNG'07).

[129]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[130]  Venu Govindaraju,et al.  Similarity Measure Functions for Strategy-Based Biometrics , 2008 .

[131]  Roman V. Yampolskiy Behavioral Modeling: an Overview , 2008 .

[132]  Kenneth Revett,et al.  Behavioral Biometrics: A Remote Access Approach , 2008 .

[133]  Rolf Ingold,et al.  Combined Handwriting and Speech Modalities for User Authentication , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[134]  Efstathios Stamatatos,et al.  Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.

[135]  Vinayak Ashok Bharadi Biometric Authentication Systems , 2012 .