Using associative classification to authenticate mobile device users

Because passwords and personal identification numbers are easily forgotten, stolen, or reused on multiple accounts, the current norm for mobile device security is quickly becoming inefficient and inconvenient. Thus, manufacturers have worked to make physiological biometrics accessible to mobile device owners as improved security measures. While behavioral biometrics has yet to receive commercial attention, researchers have continued to consider these approaches as well. However, studies of interactive data are limited, and efforts which are aimed at improving the performance of such techniques remain relevant. Thus, this paper provides a performance analysis of application, Bluetooth, and Wi-Fi data collected from 189 subjects on a mobile device for user verification. Results indicate that user authentication can be achieved with up to 91% accuracy, demonstrating the effectiveness of associative classification as a feature extraction technique.

[1]  Daniel Hunyadi,et al.  Performance comparison of apriori and FP-growth algorithms in generating association rules , 2011 .

[2]  Tempestt J. Neal,et al.  Surveying Biometric Authentication for Mobile Device Security , 2016 .

[3]  Elham Tabassi,et al.  Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  Jiawei Han,et al.  CPAR: Classification based on Predictive Association Rules , 2003, SDM.

[5]  Fadi A. Thabtah,et al.  A review of associative classification mining , 2007, The Knowledge Engineering Review.

[6]  Kamal Ali,et al.  Partial Classification Using Association Rules , 1997, KDD.

[7]  Chris Bevan,et al.  Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..

[8]  Das Amrita,et al.  Mining Association Rules between Sets of Items in Large Databases , 2013 .

[9]  Andrew S Branscomb Behaviorally Identifying Smartphone Users. , 2013 .

[10]  Alessandro Neri,et al.  Keystroke dynamics authentication for mobile phones , 2011, SAC.

[11]  P.Susan Lalitha Grace,et al.  Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017 .

[12]  Jugal K. Kalita,et al.  Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.

[13]  David A. Wagner,et al.  I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.

[14]  P. Bhattarakosol,et al.  Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[15]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[16]  Tempestt J. Neal,et al.  Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[17]  Mudhafar M. Al-Jarrah,et al.  Statistical median-based classifier model for keystroke dynamics on mobile devices , 2016, 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC).

[18]  Stephen Marsh,et al.  Anomaly Detection for Mobile Device Comfort , 2014, IFIPTM.

[19]  Kamaljit Singh Bhatia,et al.  Keystroke Dynamics for Mobile Phones: A Survey , 2016 .

[20]  Simon Tjoa,et al.  Touch to Authenticate — Continuous Biometric Authentication on Mobile Devices , 2015, 2015 1st International Conference on Software Security and Assurance (ICSSA).

[21]  Juliane Krämer,et al.  “My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[22]  Yi-Chung Hu,et al.  Mining fuzzy association rules for classification problems , 2002 .

[23]  Bing Liu,et al.  Classification Using Association Rules: Weaknesses and Enhancements , 2001 .

[24]  Paul Dowland,et al.  Behaviour Profiling on Mobile Devices , 2010, 2010 International Conference on Emerging Security Technologies.

[25]  Alexander De Luca,et al.  It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.

[26]  Christian Borgelt,et al.  Simple Algorithms for Frequent Item Set Mining , 2010, Advances in Machine Learning II.

[27]  Maria Papadaki,et al.  Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.

[28]  B. Larson Meet the Overlapping Coefficient , 2014 .

[29]  Steven Furnell,et al.  Transparent authentication systems for mobile device security: A review , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[30]  Issa Traoré,et al.  Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).