Temporal Pattern in Tweeting Behavior for Persons' Identity Verification

Social interactions via Online Social Network (OSN) can provide a gamut of information about users that have been recently studied as behavioral patterns for person recognition. Similar to social interactions, the temporal information of persons in OSN is likely to exhibit behavioral characteristic and habitual pattern. This paper presents the first empirical study to answer a question whether temporal information obtained via OSN may contain sufficient behavioral biometric properties. In this paper, we present a methodology to identify a set of idiosyncratic temporal features and develop a system based on those unique features for identity verification. To the best of our knowledge, this is the first study on identity verification based on solely temporal profile obtained from an online social network. Experiments demonstrate that the proposed unique temporal profile in OSN can be utilized for users' identity verification, as it obtained low EER of 12% and high AUC of 95.2% in a closed-set test scenario. Potential applications of the proposed temporal profile include identity verification, anomaly and fraud detection, identity theft, continuous authentication, human behavior analysis, and so on.

[1]  Marina L. Gavrilova,et al.  Authorship recognition of tweets: A comparison between social behavior and linguistic profiles , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[2]  Eugénio C. Oliveira,et al.  'twazn me!!! ;(' Automatic Authorship Analysis of Micro-Blogging Messages , 2011, NLDB.

[3]  Julien Velcin,et al.  Sentiment analysis on social media for stock movement prediction , 2015, Expert Syst. Appl..

[4]  Maria Papadaki,et al.  Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.

[5]  Marina L. Gavrilova,et al.  A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends , 2014, 2014 International Conference on Cyberworlds.

[6]  Mark Rahmes,et al.  Matching social network biometrics using geo-analytical behavioral modeling , 2014, 2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).

[7]  Marina L. Gavrilova,et al.  Social Behavioral Information Fusion in Multimodal Biometrics , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  Vitomir Struc,et al.  The Complete Gabor-Fisher Classifier for Robust Face Recognition , 2010, EURASIP J. Adv. Signal Process..

[9]  Marina L. Gavrilova,et al.  Soft biometric: Give me your favorite images and i will tell your gender , 2016, 2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).

[10]  Claude Castelluccia,et al.  Towards Web-Based Biometric Systems Using Personal Browsing Interests , 2013, 2013 International Conference on Availability, Reliability and Security.

[11]  Nicu Sebe,et al.  Faved! Biometrics: Tell Me Which Image You Like and I'll Tell You Who You Are , 2014, IEEE Transactions on Information Forensics and Security.

[12]  P.Susan Lalitha Grace,et al.  Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017 .

[13]  Rama Chellappa,et al.  PATH: Person authentication using trace histories , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[14]  Athanasios Bamis,et al.  A method for improving mobile authentication using human spatio-temporal behavior , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[15]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[16]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[18]  Tempestt J. Neal,et al.  Using associative classification to authenticate mobile device users , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[19]  Ji Xiang,et al.  From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  Yuefeng Li,et al.  The state-of-the-art in personalized recommender systems for social networking , 2012, Artificial Intelligence Review.

[21]  Yu Zhang,et al.  Identifying Key Users for Targeted Marketing by Mining Online Social Network , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[22]  Marina L. Gavrilova,et al.  User Recognition From Social Behavior in Computer-Mediated Social Context , 2017, IEEE Transactions on Human-Machine Systems.

[23]  John W. Sheppard,et al.  Comparing Frequency- and Style-Based Features for Twitter Author Identification , 2013, FLAIRS.

[24]  Sushil Jajodia,et al.  Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.