Visible to the public Continuous Authentication in a real world settings

TitleContinuous Authentication in a real world settings
Publication TypeConference Paper
Year of Publication2015
AuthorsMondal, S., Bours, P.
Conference Name2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR)
Date Publishedjan
Keywordsauthentication, authorisation, behavioural biometrics, computer input devices, Computers, Continuous Authentication, continuous authentication system, data collection software, feature extraction, keystroke dynamics, Mathematical model, Mice, Mouse Dynamics, periodic authentication, Presses, pubcrawl170115, Software, trust model
Abstract

Continuous Authentication by analysing the user's behaviour profile on the computer input devices is challenging due to limited information, variability of data and the sparse nature of the information. As a result, most of the previous research was done as a periodic authentication, where the analysis was made based on a fixed number of actions or fixed time period. Also, the experimental data was obtained for most of the previous research in a very controlled condition, where the task and environment were fixed. In this paper, we will focus on actual continuous authentication that reacts on every single action performed by the user. The experimental data was collected in a complete uncontrolled condition from 52 users by using our data collection software. In our analysis, we have considered both keystroke and mouse usages behaviour pattern to avoid a situation where an attacker avoids detection by restricting to one input device because the continuous authentication system only checks the other input device. The result we have obtained from this research is satisfactory enough for further investigation on this domain.

URLhttps://ieeexplore.ieee.org/document/7050673
DOI10.1109/ICAPR.2015.7050673
Citation Keymondal_continuous_2015