Detection of spoofed identities on smartphones via sociability metrics

The pervasiveness of smartphones equipped with various built-in sensors combined with the capability of serving multiple applications that could access social network information introduces next generation soft biometrics tools that could be used to verify a user's identity through their social behavior. Smart mobile devices can provide multi-modal data acquisition from various social networking applications, and when aggregated, these data can help form highly identifiable behaviometric information. Continuous identification and authentication of users through monitoring social behavior improves detection of identity spoofing. In this paper, we propose a social behaviometric framework to cope with identity spoofing on smartphones. The proposed framework consists of a front-end client module that acquires and provides social networking data to the back-end module which runs online machine learning procedures and provides analytics as a service to the front-end in order to verify user identity through social interactions. We evaluate the performance of the proposed framework by using real data collected from participants, and inject noisy behavioral patterns to simulate identity spoofing scenarios. Performance results show that under anomalous behavioral patterns, the proposed system can identify genuine users with up to 97% success ratio using an aggregated behavior pattern on five different social network applications.

[1]  Wen-Yuan Wang,et al.  Biologic verification based on pressure sensor keyboards and classifier fusion techniques , 2006, IEEE Transactions on Consumer Electronics.

[2]  Mingyue Li,et al.  Security vulnerabilities of an remote password authentication scheme with smart card , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).

[3]  Stephen S. Yau,et al.  An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.

[4]  Moon-Seog Jun,et al.  Home IoT device certification through speaker recognition , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).

[5]  Kenji Mase,et al.  Recognition of walking behaviors for pedestrian navigation , 2001, Proceedings of the 2001 IEEE International Conference on Control Applications (CCA'01) (Cat. No.01CH37204).

[6]  Marina L. Gavrilova,et al.  Online User Interaction Traits in Web-Based Social Biometrics , 2014 .

[7]  Marina L. Gavrilova,et al.  Social Behavioral Biometrics: An Emerging Trend , 2015, Int. J. Pattern Recognit. Artif. Intell..

[8]  Burak Kantarci,et al.  Mobile behaviometric framework for sociability assessment and identification of smartphone users , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[9]  Steven Furnell,et al.  Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.

[10]  Rama Chellappa,et al.  Activity recognition using the dynamics of the configuration of interacting objects , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[11]  Venu Govindaraju,et al.  Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..

[12]  Diane J. Cook,et al.  Behaviometrics for Identifying Smart Home Residents , 2013 .

[13]  Koduvayur P. Subbalakshmi,et al.  Scam Detection in Twitter , 2014 .

[14]  Fadi Al-Turjman,et al.  Impact of user's habits on smartphones' sensors: An overview , 2016, 2016 HONET-ICT.

[15]  Santhanakrishnan Anand,et al.  Identification of Source of Rumors in Social Networks with Incomplete Information , 2015, ArXiv.

[16]  Burak Kantarci,et al.  Towards secure cloud-centric Internet of Biometric Things , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).

[17]  Arun Ross,et al.  What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Marina L. Gavrilova,et al.  A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends , 2014, 2014 International Conference on Cyberworlds.