Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives

Mobile phone touch screen devices are equipped with high processing power and high memory. This led to users not only storing photos or videos but stored sensitive application such as banking applications. As a result of that the security system of the mobile phone touch screen devices becomes sacrosanct. The application of machine learning algorithms in enhancing security on mobile phone touch screen devices is gaining a tremendous popularity in both academia and the industry. However, notwithstanding the growing popularity, up to date no comprehensive survey has been conducted on machine learning algorithms solutions to improve the security of mobile phone touch screen devices. This survey aims to connect this gap by conducting a comprehensive survey on the solutions of machine learning algorithms to improve the security of mobile phone touch screen devices including the analysis and synthesis of the algorithms and methodologies provided for those solutions. This article presents a comprehensive survey and a new taxonomy of the state-of-the-art literature on machine learning algorithms in improving the security of mobile phone touch screen devices. The limitation of the methodology in each article reviewed is pointed out. Challenges of the existing approaches and new perspective of future research directions for developing more accurate and robust solutions to mobile phone touch screen security are discussed. In particular, the survey found that exploring of different aspects of deep learning solutions to improve the security of mobile phone touch screen devices is under-explored.

[1]  Blaine Nelson,et al.  The security of machine learning , 2010, Machine Learning.

[2]  Divya Tomar,et al.  Twin Support Vector Machine: A review from 2007 to 2014 , 2015 .

[3]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[4]  Tao Feng,et al.  Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[5]  Haruna Chiroma,et al.  A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems , 2015, SCSE.

[6]  Ulf-Dietrich Reips,et al.  "Big Data" : big gaps of knowledge in the field of internet science , 2012 .

[7]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[8]  Alex X. Liu,et al.  Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures , 2017, IEEE Transactions on Mobile Computing.

[9]  Zhi-Li Zhang,et al.  Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[10]  Mehran Sahami,et al.  Learning Limited Dependence Bayesian Classifiers , 1996, KDD.

[11]  Dongsong Zhang,et al.  Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones , 2016, Decis. Support Syst..

[12]  Alessandro Neri,et al.  User authentication using keystroke dynamics for cellular phones , 2009 .

[13]  Tim Storer,et al.  A framework for continuous, transparent mobile device authentication , 2013, Comput. Secur..

[14]  Duncan S. Wong,et al.  Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones , 2014, SAC.

[15]  Benjamin Edwards,et al.  Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering , 2018, SafeAI@AAAI.

[16]  Janne Lindqvist,et al.  Engineering Gesture-Based Authentication Systems , 2014, IEEE Pervasive Computing.

[17]  Mohamed A. Ismail,et al.  Multi-level gene/MiRNA feature selection using deep belief nets and active learning , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[18]  Abdulmotaleb El-Saddik,et al.  ECG Authentication for Mobile Devices , 2016, IEEE Transactions on Instrumentation and Measurement.

[19]  Nir Friedman,et al.  Bayesian Network Classifiers , 1997, Machine Learning.

[20]  Dongsong Zhang,et al.  Continuous User Authentication on Touch-Screen Mobile Phones: Toward More Secure and Usable M-Commerce , 2016, WEB.

[21]  Nikolaos Pitropakis,et al.  A taxonomy and survey of attacks against machine learning , 2019, Comput. Sci. Rev..

[22]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[23]  Florian Alt,et al.  Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.

[24]  Ondrej Krejcar,et al.  Pattern Password Authentication Based on Touching Location , 2015, IDEAL.

[25]  Xin Su,et al.  User biometric information‐based secure method for smart devices , 2018, Concurr. Comput. Pract. Exp..

[26]  Nasir D. Memon,et al.  DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices , 2017, Comput. Secur..

[27]  Marco Gruteser,et al.  Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen , 2014, IEEE Transactions on Mobile Computing.

[28]  Christophe Rosenberger,et al.  Biometric secret path for mobile user authentication: A preliminary study , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[29]  Roger Wattenhofer,et al.  A personal touch: recognizing users based on touch screen behavior , 2012, PhoneSense '12.

[30]  Simon Fong,et al.  Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications , 2011, NDT.

[31]  Duncan S. Wong,et al.  Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.

[32]  Ioannis A. Kakadiaris,et al.  Mobile User Authentication Using Statistical Touch Dynamics Images , 2014, IEEE Transactions on Information Forensics and Security.

[33]  Feng Hao,et al.  Stealing PINs via mobile sensors: actual risk versus user perception , 2016, International Journal of Information Security.

[34]  Alex X. Liu,et al.  Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.

[35]  Bernhard Schölkopf,et al.  A tutorial on support vector regression , 2004, Stat. Comput..

[36]  Mahesh Pal,et al.  Random forest classifier for remote sensing classification , 2005 .

[37]  Eamonn J. Keogh,et al.  Derivative Dynamic Time Warping , 2001, SDM.

[38]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[39]  Xiaojiang Chen,et al.  Cracking Android Pattern Lock in Five Attempts , 2017, NDSS.

[40]  Klaus H. Hinrichs,et al.  An implicit author verification system for text messages based on gesture typing biometrics , 2014, CHI.

[41]  Yuexuan An,et al.  孪生支持向量机综述 (Twin Support Vector Machine: A Review) , 2018, 计算机科学.

[42]  Xiang-Yang Li,et al.  SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.

[43]  Robert P. Sheridan,et al.  Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling , 2003, J. Chem. Inf. Comput. Sci..

[44]  Vivek Kanhangad,et al.  Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..

[45]  Victor Cheung,et al.  Typhlex: Exploring Deformable Input for Blind Users Controlling a Mobile Screen Reader , 2017, IEEE Pervasive Computing.

[46]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[47]  Tsai-Hua Kang,et al.  Random graphic user password authentication scheme in mobile devices , 2017, 2017 International Conference on Applied System Innovation (ICASI).

[48]  Rama Chellappa,et al.  Face-based Active Authentication on mobile devices , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[49]  Abeer Alsadoon,et al.  Designing Touch-Based Hybrid Authentication Method for Smartphones , 2015 .

[50]  E.F. El-Saadany,et al.  Disturbance classification utilizing dynamic time warping classifier , 2004, IEEE Transactions on Power Delivery.

[51]  Md. Zakirul Alam Bhuiyan,et al.  A Survey on Deep Learning in Big Data , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[52]  Deron Liang,et al.  A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.

[53]  Do Van Thanh,et al.  Strengthening Mobile Network Security Using Machine Learning , 2016, MobiWIS.

[54]  Nasir D. Memon,et al.  An HMM-based behavior modeling approach for continuous mobile authentication , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[55]  Leif E. Peterson K-nearest neighbor , 2009, Scholarpedia.

[56]  Dong Xu,et al.  A multimodal deep architecture for large-scale protein ubiquitylation site prediction , 2017, 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).

[57]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[58]  Zhen Ling,et al.  FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices , 2020, Future Gener. Comput. Syst..

[59]  Gilberto Berardinelli,et al.  Achieving Ultra-Reliable Low-Latency Communications: Challenges and Envisioned System Enhancements , 2018, IEEE Network.

[60]  Orcan Alpar Intelligent biometric pattern password authentication systems for touchscreens , 2015, Expert Syst. Appl..

[61]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[62]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[63]  Heekuck Oh,et al.  Neural Networks for Pattern Recognition , 1993, Adv. Comput..

[64]  Marti A. Hearst Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..

[65]  Yajin Zhou,et al.  Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.

[66]  Simone Sacchi,et al.  Definitions of dataset in the scientific and technical literature , 2010, ASIST.

[67]  Hongyuan Zha,et al.  LatentGesture: active user authentication through background touch analysis , 2014, Chinese CHI '14.

[68]  Yuji Watanabe,et al.  Influence of Holding Smart Phone for Acceleration-Based Gait Authentication , 2014, 2014 Fifth International Conference on Emerging Security Technologies.

[69]  MemonNasir,et al.  DRAW-A-PIN , 2017 .

[70]  Rama Chellappa,et al.  Facial attributes for active authentication on mobile devices , 2017, Image Vis. Comput..

[71]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[72]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[73]  Vir V. Phoha,et al.  Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[74]  Xiaobo Zhang,et al.  Short-term electric load forecasting based on singular spectrum analysis and support vector machine optimized by Cuckoo search algorithm , 2017 .

[75]  Tao Feng,et al.  TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.

[76]  Minglu Li,et al.  Sensing Human-Screen Interaction for Energy-Efficient Frame Rate Adaptation on Smartphones , 2015, IEEE Transactions on Mobile Computing.

[77]  Andreas Christmann,et al.  Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.

[78]  Michele Risi,et al.  Visual Mobile Computing for Mobile End-Users , 2016, IEEE Transactions on Mobile Computing.

[79]  Jonathan Loo,et al.  Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing , 2018, J. Netw. Comput. Appl..

[80]  Debi Prosad Dogra,et al.  A bio-signal based framework to secure mobile devices , 2017, J. Netw. Comput. Appl..

[81]  Yu Wang,et al.  TouchWB: Touch behavioral user authentication based on web browsing on smartphones , 2018, J. Netw. Comput. Appl..

[82]  Bhiksha Raj,et al.  A Survey: Time Travel in Deep Learning Space: An Introduction to Deep Learning Models and How Deep Learning Models Evolved from the Initial Ideas , 2015, ArXiv.

[83]  Jaroslaw Sobieszczanski-Sobieski,et al.  Particle swarm optimization , 2002 .

[84]  Nathan Clarke,et al.  Behaviour profiling for transparent authentication for mobile devices , 2011, ECIW 2011 2011.

[85]  Usman Naeem,et al.  The 8 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks ( EUSPN 2017 ) Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing , 2017 .

[86]  Margit Antal,et al.  Biometric Authentication Based on Touchscreen Swipe Patterns , 2016 .

[87]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[88]  Rui Zhang,et al.  Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[89]  Emmanouil Panaousis,et al.  Unsupervised Learning for Trustworthy IoT , 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).

[90]  Rama Chellappa,et al.  Active user authentication for smartphones: A challenge data set and benchmark results , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[91]  Dongsong Zhang,et al.  ExtendedThumb: A Target Acquisition Approach for One-Handed Interaction With Touch-Screen Mobile Phones , 2015, IEEE Transactions on Human-Machine Systems.

[92]  Jianping Gou,et al.  A new distance-weighted k-nearest neighbor classifier , 2012 .