A Machine Learning-Based User Authentication Model Using Mobile App Data

Modern mobile phones have become ubiquitous in smart home networks for operating and controlling home appliances. As user authentication on mobile devices is mostly achieved at initial access, it is crucial to offer an authentication approach that can be continuously employed. A solution can be found by extracting information during mobile phone usage, including application access events. In this paper, we present a machine learning user authentication model for smart home networks that utilizes application access events. To validate our model, we use a real-world dataset. Considering that users may run their mobile applications differently during weekdays and weekends, the model is evaluated for continuous authentication of users who utilize shared apps at the same daily intervals during weekdays and weekends. Additionally, we assess various classifiers regarding legitimate user identification. The results show that the presented model authenticates users, with high F-measure, based on application access events.

[1]  Mehmet Fatih Amasyali,et al.  Classifier Ensembles with the Extended Space Forest , 2014, IEEE Transactions on Knowledge and Data Engineering.

[2]  Steven P. Weber,et al.  Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017, IEEE Systems Journal.

[3]  Bruno Crispo,et al.  Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[4]  Steven Furnell,et al.  A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications , 2019, ICISSP.

[5]  Eyal de Lara,et al.  Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.

[6]  Maria Papadaki,et al.  Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.

[7]  Rama Chellappa,et al.  Continuous Authentication of Smartphones Based on Application Usage , 2018, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[8]  Soumya Singh,et al.  Advancement of recommender system based on clickstream data using gradient boosting and random forest classifiers , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[9]  Longbing Cao,et al.  Coupled K-Nearest Centroid Classification for Non-iid Data , 2014, Trans. Comput. Collect. Intell..

[10]  Chi-Woong Mun,et al.  Comparison of k-nearest neighbor, quadratic discriminant and linear discriminant analysis in classification of electromyogram signals based on the wrist-motion directions , 2011 .

[11]  Qusay H. Mahmoud,et al.  Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes , 2019, Applied System Innovation.

[12]  Nathan Clarke,et al.  Behaviour profiling for transparent authentication for mobile devices , 2011, ECIW 2011 2011.

[13]  Lei Yang,et al.  Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[14]  Tempestt J. Neal,et al.  Using associative classification to authenticate mobile device users , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[15]  Qusay H. Mahmoud,et al.  A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[16]  Sattar Hashemi,et al.  To Combat Multi-Class Imbalanced Problems by Means of Over-Sampling Techniques , 2016, IEEE Transactions on Knowledge and Data Engineering.

[17]  Maria Papadaki,et al.  Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.

[18]  Qusay H. Mahmoud,et al.  A User Authentication Model for IoT Networks Based on App Traffic Patterns , 2018, 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).

[19]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[20]  Terry Windeatt,et al.  Accuracy/Diversity and Ensemble MLP Classifier Design , 2006, IEEE Transactions on Neural Networks.

[21]  Akebo Yamakami,et al.  Compression-based spam filter , 2016, Secur. Commun. Networks.

[22]  Yoshinobu Tamura,et al.  OSS Project Stability Assessment Support Tool Considering EVM Based on Wiener Process Models , 2019, Applied System Innovation.

[23]  Chelsea Dobbins,et al.  Lesson Learned from Collecting Quantified Self Information via Mobile and Wearable Devices , 2015, J. Sens. Actuator Networks.