How Artificial Intelligence can be used for Behavioral Identification?

Nowadays, users interact with computer systems. Behavioral biometrics consists of analyzing user's interactions for identification and verification applications. This approach could be very useful for enhancing security and improving user experience and many privacy concerns are also related. In this paper, we address the problem of user identification considering their behaviors. How efficient are classical machine learning methods on such data? What about deep learning approaches? We illustrate this work on two behavioral modalities namely human activity using smartphones and keystroke dynamics on a laptop. Since the accuracy rates of most behavioral biometrics modalities are lower than morphological ones, we consider two approaches for these modalities that can be represented as time series: classical machine learning and deep learning techniques. We intend to show that many algorithms can obtain very good performance for different modalities without any specific tuning to the considered modality. This comparative analysis allows us to show that behavioral biometrics can be used for security applications (i.e. who is accessing the company information system) but could be a privacy concern as a user could be identified while navigating on the Internet.

[1]  Majid Sarrafzadeh,et al.  Smartwatch Based Activity Recognition Using Active Learning , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[2]  Christophe Rosenberger,et al.  Soft Biometrics for Keystroke Dynamics , 2013, ICIAR.

[3]  Davide Anguita,et al.  A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.

[4]  Haruhiko Nishimura,et al.  Keystroke timing analysis for individual identification in Japanese free text typing , 2009, 2009 ICCAS-SICE.

[5]  Hairong Lv,et al.  Emotion recognition based on pressure sensor keyboards , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[6]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[7]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[8]  Matthew D. Zeiler ADADELTA: An Adaptive Learning Rate Method , 2012, ArXiv.

[9]  Christophe Rosenberger,et al.  Soft biometrics database: A benchmark for keystroke dynamics biometric systems , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[10]  Med Salim Bouhlel,et al.  A new hybrid deep learning model for human action recognition , 2020, J. King Saud Univ. Comput. Inf. Sci..

[11]  Anna Visvizi,et al.  Tweeting and mining OECD-related microcontent in the post-truth era: A cloud-based app , 2020, Comput. Hum. Behav..

[12]  Germain Forestier,et al.  Deep learning for time series classification: a review , 2018, Data Mining and Knowledge Discovery.

[13]  Joaquín B. Ordieres Meré,et al.  Non-Invasive Ambient Intelligence in Real Life: Dealing with Noisy Patterns to Help Older People , 2019, Sensors.

[14]  Arun Sahayadhas,et al.  Research on Human Activity Identification Based on Image Processing and Artificial Intelligence , 2018, International Journal of Engineering & Technology.

[15]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[16]  James S. Okolica,et al.  User identification and authentication using multi-modal behavioral biometrics , 2014 .

[17]  Fadi Al Machot,et al.  Zero-Shot Human Activity Recognition Using Non-Visual Sensors , 2020, Sensors.

[18]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[19]  Claudia Picardi,et al.  Identity verification through dynamic keystroke analysis , 2003, Intell. Data Anal..

[20]  Qusay H. Mahmoud,et al.  A Multi-Feature User Authentication Model Based on Mobile App Interactions , 2020, IEEE Access.

[21]  Miltiadis D. Lytras,et al.  Social Networks Research for Sustainable Smart Education , 2018, Sustainability.

[22]  Yan Lu,et al.  Human Activity Recognition using Smartphone , 2014, ArXiv.

[23]  Abdulhamit Subasi,et al.  Human activity recognition using machine learning methods in a smart healthcare environment , 2020 .

[24]  Daniel Tchiotsop,et al.  Denoising of electroencephalographic signals by canonical correlation analysis and by second-order blind source separation , 2019, 2019 IEEE AFRICON.

[25]  Martin Mozina,et al.  Orange: data mining toolbox in python , 2013, J. Mach. Learn. Res..

[26]  Zhe Jin,et al.  Typing dynamics biometric authentication through fuzzy logic , 2008, 2008 International Symposium on Information Technology.

[27]  Khalid Saeed,et al.  A Keystroke Dynamics Based System for User Identification , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[28]  Christophe Rosenberger,et al.  Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets , 2019, Future Gener. Comput. Syst..

[29]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[30]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.