Human Trait Analysis via Machine Learning Techniques for User Authentication

Machine learning is an extremely important technique that has become heavily used in different types of applications such as detection systems for fraud, intrusion or fault and monitoring systems for health or computer. Human trait analysis and identification is a field of research that needs a strong implementation for machine learning. Human trait analysis provides a tool with which human identification factors can be verified. Currently, detail aspects of human behavior are digitally and continuously logged in Big Data based platforms such as Twitter and Facebook. This continuous flow of high-volume data requires sophisticated data analysis to examine huge amounts of behavioral evidence so that human traits can be modeled. This paper proposes an innovative technique for human trait analysis that fits the needs for user’s identity verification. The pioneering work of this technique is in the distinction of the normal and abnormal actions of the users, where the focus is given to these abnormal actions to establish security potential profiles. The data analysis and prediction of the proposed technique is based on the concept of machine learning and uses several models based on four techniques; K-means, Hidden Markov Model (HMM), Auto-Encoder Neural Network, and Gaussian Distribution. Experiments have been carried out in four main phases: prediction of rare user actions, filter security potential actions, build/update a user profile, and generate a real-time (i.e. just in time) set of challenging questions. Real-world scenarios are considered to demonstrate the benefits of these challenging questions in building secure knowledge-based user authentication systems.

[1]  M. Amaç Güvensan,et al.  Network intrusion detection using machine learning anomaly detection algorithms , 2017, 2017 25th Signal Processing and Communications Applications Conference (SIU).

[2]  Lei Pan,et al.  Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative , 2014, 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[3]  Wenqiang Cui,et al.  Anomaly detection and visualization of school electricity consumption data , 2017, 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA)(.

[4]  Jocelyn Chanussot,et al.  Robust anomaly detection in Hyperspectral Imaging , 2014, 2014 IEEE Geoscience and Remote Sensing Symposium.

[5]  Qun Jin,et al.  Detection of Anomaly Health Data by Specifying Latent Factors with SEM and Estimating Hidden States with HMM , 2018, 2018 9th International Conference on Information Technology in Medicine and Education (ITME).

[6]  Weishi Zhang,et al.  An Anomaly Intrusion Detection Method Based on Improved K-Means of Cloud Computing , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).

[7]  Mark Cheung,et al.  Contrastive Structured Anomaly Detection for Gaussian Graphical Models , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[8]  S. Varuna,et al.  An integration of k-means clustering and naïve bayes classifier for Intrusion Detection , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[9]  M. Bahrololum,et al.  Anomaly Intrusion Detection System Using Gaussian Mixture Model , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[10]  Ali Yazdian Varjani,et al.  Intrusion detection based on MinMax K-means clustering , 2014, 7'th International Symposium on Telecommunications (IST'2014).

[11]  Jeong-Uk Kim,et al.  An Improved K-Means Using in Anomaly Detection , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).

[12]  Abdelkader H. Ouda,et al.  Data Analytics Methods for Anomaly Detection: Evolution and Recommendations , 2018, 2018 International Conference on Signal Processing and Information Security (ICSPIS).

[13]  Yu Cui,et al.  A Convolutional Auto-Encoder Method for Anomaly Detection on System Logs , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[14]  Mohamad Jeragh,et al.  Combining Auto Encoders and One Class Support Vectors Machine for Fraudulant Credit Card Transactions Detection , 2018, 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4).

[15]  S. E. Yüksel,et al.  Comparison of RX-based anomaly detectors on synthetic and real hyperspectral data , 2015, 2015 7th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS).

[16]  Darpan Anand,et al.  Dynamic Id Based Remote User Authentication in Multi Server Environment Using Smart Cards: A Review , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[17]  Mohammad Teshnehlab,et al.  An anomaly detection method to detect web attacks using Stacked Auto-Encoder , 2018, 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).

[18]  Axel Küpper,et al.  Anomaly Detection with HMM Gauge Likelihood Analysis , 2019, 2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService).

[19]  Huiquan Wang,et al.  Optimization of Reconstruction Accuracy of Anomaly Position Based on Stacked Auto-Encoder Neural Networks , 2019, IEEE Access.

[20]  Vineeth Vijayaraghavan,et al.  Current peak based device classification in NILM on a low-cost embedded platform using extra-trees , 2017, 2017 IEEE MIT Undergraduate Research Technology Conference (URTC).

[21]  Qi Wang,et al.  A sparse dictionary learning method for hyperspectral anomaly detection with capped norm , 2017, 2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).

[22]  Shisheng Zhong,et al.  Gas turbine engine gas path anomaly detection using deep learning with Gaussian distribution , 2017, 2017 Prognostics and System Health Management Conference (PHM-Harbin).

[23]  Abdelkader H. Ouda,et al.  A hybrid-based filtering approach for user authentication , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[24]  Li Han Using a Dynamic K-means Algorithm to Detect Anomaly Activities , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[25]  Mehran Fazeli,et al.  Knowledge based dynamic password , 2017, 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI).

[26]  Zhao Chen,et al.  Anomaly detection methods for bankruptcy prediction , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).

[27]  Soon-Nyean Cheong,et al.  LSTM and HMM Comparison for Home Activity Anomaly Detection , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[28]  Anas Ibrahim,et al.  Innovative Data Authentication Model , 2016, 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[29]  Beizhan Wang,et al.  Survey on HMM based anomaly intrusion detection using system calls , 2010, 2010 5th International Conference on Computer Science & Education.

[30]  Abdelkader Ouda,et al.  The importance of human dynamics in the future user authentication , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[31]  Divya M. Menon,et al.  Anomaly detection in smart grid traffic data for home area network , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).

[32]  Mohamed Zohdy,et al.  Network Anomaly Detection Using Two-Dimensional Hidden Markov Model Based Viterbi Algorithm , 2019, 2019 IEEE International Conference On Artificial Intelligence Testing (AITest).

[33]  Li Han Research of K-MEANS Algorithm Based on Information Entropy in Anomaly Detection , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[34]  Mahmood Fathy,et al.  Video anomaly detection and localisation based on the sparsity and reconstruction error of auto-encoder , 2016 .

[35]  Fahimeh Farahnakian,et al.  A deep auto-encoder based approach for intrusion detection system , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[36]  Naixue Xiong,et al.  Learning Sparse Representation With Variational Auto-Encoder for Anomaly Detection , 2018, IEEE Access.

[37]  Nicholas Micallef,et al.  Changing users' security behaviour towards security questions: A game based learning approach , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).

[38]  Francesco Cricri,et al.  Clustering and Unsupervised Anomaly Detection with l2 Normalized Deep Auto-Encoder Representations , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[39]  Majid Sarrafzadeh,et al.  Unsupervised Prediction of Negative Health Events Ahead of Time , 2019, 2019 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI).

[40]  Fei Wang,et al.  A novel framework for anomaly detection based on hybrid HMM-SVM model , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[41]  Abdelkader Ouda,et al.  User Modeling via Anomaly Detection Techniques for User Authentication , 2019, 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[42]  Beizhan Wang,et al.  A method for HMM-based system calls intrusion detection based on hybrid training algorithm , 2011, 2011 IEEE International Conference on Information and Automation.

[43]  Tsai-Hua Kang,et al.  Random graphic user password authentication scheme in mobile devices , 2017, 2017 International Conference on Applied System Innovation (ICASI).

[44]  Fei Wang,et al.  A HMM-based method for anomaly detection , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[45]  Fuyou Miao,et al.  A new dynamic user authentication scheme using smart cards for wireless sensor network , 2011, 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering.

[46]  Heinrich Hußmann,et al.  I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones , 2015, CHI.

[47]  Jörg Schwenk,et al.  Secure Fallback Authentication and the Trusted Friend Attack , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[48]  Wang Lei,et al.  Spectrum anomalies autonomous detection in cognitive radio using Hidden Markov Models , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[49]  Abdelkader Ouda A framework for next generation user authentication , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).