Continuous Authentication in a real world settings
Title | Continuous Authentication in a real world settings |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Mondal, S., Bours, P. |
Conference Name | 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR) |
Date Published | jan |
Keywords | authentication, authorisation, behavioural biometrics, computer input devices, Computers, Continuous Authentication, continuous authentication system, data collection software, feature extraction, keystroke dynamics, Mathematical model, Mice, Mouse Dynamics, periodic authentication, Presses, pubcrawl170115, Software, trust model |
Abstract | Continuous Authentication by analysing the user's behaviour profile on the computer input devices is challenging due to limited information, variability of data and the sparse nature of the information. As a result, most of the previous research was done as a periodic authentication, where the analysis was made based on a fixed number of actions or fixed time period. Also, the experimental data was obtained for most of the previous research in a very controlled condition, where the task and environment were fixed. In this paper, we will focus on actual continuous authentication that reacts on every single action performed by the user. The experimental data was collected in a complete uncontrolled condition from 52 users by using our data collection software. In our analysis, we have considered both keystroke and mouse usages behaviour pattern to avoid a situation where an attacker avoids detection by restricting to one input device because the continuous authentication system only checks the other input device. The result we have obtained from this research is satisfactory enough for further investigation on this domain. |
URL | https://ieeexplore.ieee.org/document/7050673 |
DOI | 10.1109/ICAPR.2015.7050673 |
Citation Key | mondal_continuous_2015 |
- keystroke dynamics
- trust model
- Software
- pubcrawl170115
- Presses
- periodic authentication
- Mouse Dynamics
- Mice
- Mathematical model
- authentication
- feature extraction
- data collection software
- continuous authentication system
- Continuous Authentication
- Computers
- computer input devices
- behavioural biometrics
- authorisation