A behavioral authentication method for mobile based on browsing behaviors

The passwords for unlocking the mobile devices are relatively simple, easier to be stolen, which causes serious potential security problems. An important research direction of identity authentication is to establish user behavior models to authenticate users. In this paper, a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed. This architecture is suitable for users using the mobile terminal APP in the daily life. The architecture includes data acquisition, data processing, feature extraction, and sub model training. We can use this architecture for continuous authentication when the user uses APP at the mobile terminal.

[1]  Kent A. Spackman,et al.  Signal Detection Theory: Valuable Tools for Evaluating Inductive Learning , 1989, ML.

[2]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.

[3]  Qiang Liu,et al.  A behavioral authentication method for mobile gesture against resilient user posture , 2016, 2016 3rd International Conference on Systems and Informatics (ICSAI).

[4]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.

[5]  Vincenzo Piuri,et al.  Toward Unconstrained Fingerprint Recognition: A Fully Touchless 3-D System Based on Two Views on the Move , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[6]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[7]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[8]  Chao Shen,et al.  Touch-interaction behavior for continuous user authentication on smartphones , 2015, 2015 International Conference on Biometrics (ICB).

[9]  Abdallah Bashir Musa Comparative study on classification performance between support vector machine and logistic regression , 2012, International Journal of Machine Learning and Cybernetics.

[10]  Priyanka Trikha,et al.  Fast Density Based Clustering Algorithm , 2013 .

[11]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[12]  Pineda,et al.  Generalization of back-propagation to recurrent neural networks. , 1987, Physical review letters.

[13]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[14]  John Daugman,et al.  New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Jonghyun Choi,et al.  Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[16]  Peter J. Rousseeuw,et al.  Finding Groups in Data: An Introduction to Cluster Analysis , 1990 .

[17]  Xing Liu-tao Improvement of C4.5 decision tree continuous attributes segmentation threshold algorithm and its application , 2011 .

[18]  Wei-Yin Loh,et al.  Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..

[19]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[20]  Miguel Lastra,et al.  Fast fingerprint identification using GPUs , 2015, Inf. Sci..

[21]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[22]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[23]  Xiaogang Wang,et al.  Hybrid Deep Learning for Face Verification , 2013, 2013 IEEE International Conference on Computer Vision.

[24]  Tao Feng,et al.  Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[25]  Xiaolong Su,et al.  An improved K-Means clustering algorithm , 2010, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[26]  Trac D. Tran,et al.  Partial face recognition: A sparse representation-based approach , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Tao Feng,et al.  TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.

[28]  Hao Zhang,et al.  Segmentation of 3D meshes through spectral clustering , 2004, 12th Pacific Conference on Computer Graphics and Applications, 2004. PG 2004. Proceedings..

[29]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[30]  Nasir D. Memon,et al.  An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[31]  Chunying Zhang,et al.  Attribute weighted Naive Bayesian classification algorithm , 2010, 2010 5th International Conference on Computer Science & Education.

[32]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[33]  P. Rousseeuw Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .

[34]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[35]  Mr. S. M. Sangave,et al.  Continuous Touchscreen Mobile Authentication Using Several Gestures , 2014 .

[36]  Jon Louis Bentley,et al.  An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.

[37]  Jiawei Han,et al.  Efficient and Effective Clustering Methods for Spatial Data Mining , 1994, VLDB.

[38]  Shifei Ding,et al.  An optimizing BP neural network algorithm based on genetic algorithm , 2011, Artificial Intelligence Review.

[39]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[40]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[41]  Bernhard Schölkopf,et al.  Support Vector Method for Novelty Detection , 1999, NIPS.

[42]  Arun Ross,et al.  Bayesian Belief models for integrating match scores with liveness and quality measures in a fingerprint verification system , 2016, 2016 International Conference on Biometrics (ICB).

[43]  Manish Mathuria,et al.  Fingerprint Recognition based on Minutiae Information , 2015 .