Evaluation of the Informativeness of Features in Datasets for Continuous Verification
- Authors: Davydenko S.A1, Kostyuchenko E.Y.1, Novikov S.N2
-
Affiliations:
- Tomsk State University of Control Systems and Radioelectronics
- Siberian State University of Telecommunications and Informatics
- Issue: Vol 23, No 1 (2024)
- Pages: 65-100
- Section: Artificial intelligence, knowledge and data engineering
- URL: https://journals.rcsi.science/2713-3192/article/view/267188
- DOI: https://doi.org/10.15622/ia.23.1.3
- ID: 267188
Cite item
Full Text
Abstract
About the authors
S. A Davydenko
Tomsk State University of Control Systems and Radioelectronics
Email: sergun_dav@mail.ru
Lenina Av. 40
E. Yu Kostyuchenko
Tomsk State University of Control Systems and Radioelectronics
Email: key@fb.tusur.ru
Lenina Av. 40
S. N Novikov
Siberian State University of Telecommunications and Informatics
Email: snovikov@ngs.ru
Kirova St. 86
References
- Jain A.K., Ross A., Pankanti S. Biometrics: a tool for information security // IEEE transactions on information forensics and security. 2006. vol. 1. no. 2. pp. 125–143.
- Jain A.K., Ross A., Prabhakar S. An introduction to biometric recognition // IEEE Transactions on circuits and systems for video technology. 2004. vol. 14. no. 1. pp. 4–20.
- Zhang N., Yu W., Fu X., Das S.K. Maintaining defender's reputation in anomaly detection against insider attacks // IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). 2009. vol. 40. no. 3. pp. 597–611.
- Liang Y., Samtani S., Guo B., Yu Z. Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective // IEEE Internet of Things Journal. 2020. vol. 7. no. 9. pp. 9128–9143.
- Al-Naji F.H., Zagrouba R. CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things // Journal of King Saud University-Computer and Information Sciences. 2022. vol. 34. no. 6. pp. 2497–2514.
- Ashibani Y., Kauling D., Mahmoud Q.H. Design and implementation of a contextual-based continuous authentication framework for smart homes // Applied System Innovation. 2019. vol. 2(1). doi: 10.3390/asi2010004.
- Oak R. A literature survey on authentication using Behavioural biometric techniques // Intelligent Computing and Information and Communication: Proceedings of 2nd International Conference, ICICC. 2018. pp. 173–181.
- Бондаренко М.А., Дрынкин В.Н. Оценка информативности комбинированных изображений в мультиспектральных системах технического зрения // Программные системы и вычислительные методы. 2016. Т. 1. С. 64–79.
- Soltane M., Bakhti M. Multi-modal biometric authentications: concept issues and applications strategies // International Journal of Advanced Science and Technology. 2012. vol. 48. pp. 23–60.
- Hong C.S., Oh T.G. TPR-TNR plot for confusion matrix // Communications for Statistical Applications and Methods. 2021. vol. 28. no. 2. pp. 161–169.
- Rahman K.A., Alam N., Musarrat J., Madarapu A., Hossain M.S. Smartwatch Dynamics: A Novel Modality and Solution to Attacks on Cyber-behavioral Biometrics for Continuous Verification? // International Symposium on Networks, Computers and Communications (ISNCC). 2020. pp. 1–5.
- Verma A., Moghaddam V., Anwar A. Data-driven behavioural biometrics for continuous and adaptive user verification using Smartphone and Smartwatch // Sustainability. 2022. vol. 14(12). doi: 10.3390/su14127362.
- Abuhamad M., Abusnaina A., Nyang D., Mohaisen D. Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey // IEEE Internet of Things Journal. 2020. vol. 8. no. 1. pp. 65–84.
- Lamiche I., Bin G., Jing Y., Yu Z., Hadid A. A continuous smartphone authentication method based on gait patterns and keystroke dynamics // Journal of Ambient Intelligence and Humanized Computing. 2019. vol. 10. pp. 4417–4430.
- Giorgi G., Saracino A., Martinelli F. Using recurrent neural networks for continuous authentication through gait analysis // Pattern Recognition Letters. 2021. vol. 147.pp. 157–163.
- Kim D.I., Lee S., Shin J.S. A new feature scoring method in keystroke dynamics-based user authentications // IEEE Access. 2020. vol. 8. pp. 27901–27914.
- Deb D., Ross A., Jain A.K., Prakah-Asante K., Prasad K.V. Actions speak louder than (pass) words: Passive authentication of smartphone* users via deep temporal features // International conference on biometrics (ICB). 2019. pp. 1–8.
- Abuhamad M., Abuhmed T., Mohaisen D., Nyang D. AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors // IEEE Internet of Things Journal. 2020. vol. 7. no. 6. pp. 5008–5020.
- Barlas Y., Basar O.E., Akan Y., Isbilen M., Alptekin G.I., Incel O.D. DAKOTA: Continuous authentication with behavioral biometrics in a mobile banking application // 5th International Conference on Computer Science and Engineering (UBMK). 2020. pp. 1–6.
- Mekruksavanich S., Jitpattanakul A. Deep learning approaches for continuous authentication based on activity patterns using mobile sensing // Sensors. 2021. vol. 21. no. 22. doi: 10.3390/s21227519.
- Acien A., Morales A., Vera-Rodriguez R., Fierrez J., Tolosana R.. Multilock: Mobile active authentication based on multiple biometric and behavioral patterns // 1st International Workshop on Multimodal Understanding and Learning for Embodied Applications. 2019. pp. 53–59.
- Li Y., Hu H., Zhu Z., Zhou G. SCANet: sensor-based continuous authentication with two-stream convolutional neural networks // ACM Transactions on Sensor Networks (TOSN). 2020. vol. 16. no. 3. pp. 1–27.
- Mekruksavanich S., Jitpattanakul A. Deep convolutional neural network with rnns for complex activity recognition using wrist-worn wearable sensor data // Electronics. 2021. vol. 10. no. 14. doi: 10.3390/electronics10141685.
- Volaka H.C., Alptekin G., Basar O.E., Isbilen M., Incel O.D. Towards continuous authentication on mobile phones using deep learning models // Procedia Computer Science. 2019. vol. 155. pp. 177–184.
- Li Y., Zou B., Deng S., Zhou G. Using feature fusion strategies in continuous authentication on smartphones // IEEE Internet Computing. 2020. vol. 24. no. 2. pp. 49–56.
- Incel O.D., Gunay S., Akan Y., Barlas Y., Basar O.E., Alptekin G.I., Isbilen M. Dakota: sensor and touch screen-based continuous authentication on a mobile banking application // IEEE Access. 2021. vol. 9. pp. 38943–38960.
- Alotaibi S., Alruban A., Furnell S., Clarke N. A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications // ICISSP. 2019. pp. 246–251.
- Mahbub U., Komulainen J., Ferreira D., Chellappa R. Continuous authentication of smartphones based on application usage // IEEE Transactions on Biometrics, Behavior, and Identity Science. 2019. vol. 1. no. 3. pp. 165–180.
- Dee T., Richardson I., Tyagi A. Continuous transparent mobile device touchscreen soft keyboard biometric authentication // 32nd international conference on VLSI design and 18th international conference on embedded systems (VLSID). 2019. pp. 539–540.
- Rahman K.A., Balagani K.S., Phoha V.V. Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes // CVPR 2011 workshops. 2011. pp. 31–38.
- Messerman A., Mustafic T., Camtepe S.A., Albayrak S. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics // International Joint Conference on Biometrics (IJCB). 2011. pp. 1–8.
- Zack R.S., Tappert C.C., Cha S.H. Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method // Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS). 2010. pp. 1–6.
- Traore I., Woungang I., Obaidat M.S., Nakkabi Y., Lai I. Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments // Fourth international conference on digital home. 2012. pp. 138–145.
- Quraishi S.J., Bedi S.S. On keystrokes as continuous user biometric authentication // International Journal of Engineering and Advanced Technology. 2019. vol. 8. no. 6. pp. 4149–4153.
- Ayotte B., Huang J., Banavar M.K., Hou D., Schuckers S. Fast continuous user authentication using distance metric fusion of free-text keystroke data // Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. 2019. pp. 1–9.
- Mhenni A., Cherrier E., Rosenberger C., Amara N.E.B. Double serial adaptation mechanism for keystroke dynamics authentication based on a single password // Computers & Security. 2019. vol. 83. pp. 151–166.
- Lu X., Zhang S., Hui P., Lio P. Continuous authentication by free-text keystroke based on CNN and RNN // Computers and Security. 2020. vol. 96. no. 101861.
- Kiyani A.T., Lasebae A., Ali K., Rehman M.U., Haq B. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach // IEEE Access. 2020. vol. 8. pp. 156177–156189.
- Shimshon T., Moskovitch R., Rokach L., Elovici Y. Continuous verification using keystroke dynamics // International conference on computational intelligence and security. IEEE Computer Society. 2010. pp. 411–415.
- Gunetti D., Picardi C. Keystroke analysis of free text // ACM Transactions on Information and System Security (TISSEC). 2005. vol. 8. no. 3. pp. 312–347.
- Stanic M. Continuous user verification based on behavioral biometrics using mouse dynamics // Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces. IEEE, 2013. С. 251–256.
- Feher C., Elovici Y., Moskovitch R., Rokach L., Schclar A. User identity verification via mouse dynamics // Information Sciences. 2012. vol. 201. pp. 19–36.
- Shen C., Cai Z., Guan X., Du Y., Maxion R.A. User authentication through mouse dynamics // IEEE Transactions on Information Forensics and Security. 2012. vol. 8. no. 1. pp. 16–30.
- Zheng N., Paloski A., Wang H. An efficient user verification system using angle-based mouse movement biometrics // ACM Transactions on Information and System Security (TISSEC). 2016. vol. 18. no. 3. pp. 1–27.
- Ahmed A.A.E., Traore I. A new biometric technology based on mouse dynamics // IEEE Transactions on dependable and secure computing. 2007. vol. 4. no. 3. pp. 165–179.
- Siddiqui N., Dave R., Vanamala M., Seliya N. Machine and deep learning applications to mouse dynamics for continuous user authentication // Machine Learning and Knowledge Extraction. 2022. vol. 4. no. 2. pp. 502–518.
- Rahman K.A., Moormann R., Dierich D., Hossain M.S. Continuous User Verification via Mouse Activities. Multimedia Communications, Services and Security: 8th International Conference, MCSS. 2015. pp. 170–181.
- Neal T., Sundararajan K., Woodard D. Exploiting linguistic style as a cognitive biometric for continuous verification // International Conference on Biometrics (ICB). IEEE, 2018. С. 270–276.
- Niinuma K., Park U., Jain A.K. Soft biometric traits for continuous user authentication // IEEE Transactions on information forensics and security. 2010. vol. 5. no. 4. pp. 771–780.
- Mock K., Hoanca B., Weaver J., Milton M. Real-time continuous iris recognition for authentication using an eye tracker // Proceedings of the 2012 ACM conference on Computer and communications security. 2012. pp. 1007–1009.
- Lin F., Song C., Zhuang Y., Xu W., Li C., Ren K.. Cardiac scan: A non-contact and continuous heart-based user authentication system // Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. 2017. pp. 315–328.
- Ingale M., Cordeiro R., Thentu S., Park Y., Karimian N.. Ecg biometric authentication: A comparative analysis // IEEE Access. 2020. vol. 8. pp. 117853–117866.
- Ekiz D., Can Y.S., Dardagan Y.C., Ersoy C. Can a smartband be used for continuous implicit authentication in real life // IEEE Access. 2020. vol. 8. pp. 59402–59411.
- Kunz M., Kasper K., Reininger H., Mobius M., Ohms J. Continuous speaker verification in realtime // BIOSIG 2011–Proceedings of the Biometrics Special Interest Group. 2011. pp. 79–87.
- Liu J., Chen Y., Dong Y., Wang Y., Zhao T., Yao Y.-Do. Continuous User Verification via Respiratory Biometrics. IEEE INFOCOM 2020 – IEEE Conference on Computer Communications. 2020. pp. 1–10.
- Zhuravchak A., Kapshii O., Pournaras E. Human Activity Recognition based on Wi-Fi CSI Data-A Deep Neural Network Approach // Procedia Computer Science. 2022. vol. 198. pp. 59–66.
- Ceker H., Upadhyaya S. User authentication with keystroke dynamics in long-text data // IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2016. pp. 1–6.
- Wang X., Shi Y., Zheng K., Zhang Y., Hong W., Cao S. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes // Sensors. 2022. vol. 22. no. 17. pp. 6627.
- Vural E., Huang J., Hou D., Schuckers S. Shared research dataset to support development of keystroke authentication // IEEE International joint conference on biometrics. IEEE, 2014. pp. 1–8.
- Li J., Chang H.C., Stamp M. Free-text keystroke dynamics for user authentication // Artificial Intelligence for Cybersecurity. Cham: Springer International Publishing, 2022. pp. 357–380.
- Sun Y., Ceker H., Upadhyaya S. Shared keystroke dataset for continuous authentication // IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2016. pp. 1–6.
- Ahmed A.A., Traore I. Biometric recognition based on free-text keystroke dynamics // IEEE transactions on cybernetics. 2013. vol. 44. no. 4. pp. 458–472.
- Martin A.G., de Diego I.M., Fernandez-Isabel A., Beltran M., Fernandez R. R. Combining user behavioural information at the feature level to enhance continuous authentication systems // Knowledge-Based Systems. 2022. vol. 244. no. 108544. doi: 10.1016/j.knosys.2022.108544.
- Harilal A., Toffalini F., Castellanos J., Guarnizo J., Homoliak I., Ochoa M.. Twos: A dataset of malicious insider threat behavior based on a gamified competition // Proceedings of the International Workshop on Managing Insider Security Threats. 2017. pp. 45–56.
- Belman A.K. et al. Insights from BB-MAS--A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone // arXiv preprint arXiv:1912.02736. 2019. 2019.
- Killourhy K.S., Maxion R.A. Free vs. transcribed text for keystroke-dynamics evaluations // Proceedings of the Workshop on Learning from Authoritative Security Experiment Results. 2012. pp. 1–8.
- Roth J., Liu X., Metaxas D. On continuous user authentication via typing behavior // IEEE Transactions on Image Processing. 2014. vol. 23. no. 10. pp. 4611–4624.
- Iapa A.C., Cretu V.I. Shared Data Set for Free-Text Keystroke Dynamics Authentication Algorithms. 2021. doi: 10.20944/preprints202105.0255.v1.
- Bergadano F., Gunetti D., Picardi C. Identity verification through dynamic keystroke analysis // Intelligent Data Analysis. 2003. vol. 7. no. 5. pp. 469–496.
- Banerjee R., Feng S., Kang J.S., Choi Y. Keystroke patterns as prosody in digital writings: A case study with deceptive reviews and essays // Proceedings of the Conference on empirical methods in natural language processing (EMNLP). 2014. pp. 1469–1473.
- Murphy C., Huang J., Hou D., Schuckers S. Shared dataset on natural human-computer interaction to support continuous authentication research // IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2017. pp. 525–530.
- Kilic A.A., Yildirim M., Anarim E. Bogazici mouse dynamics dataset // Data in Brief. 2021. vol. 36. no. 107094.
- Shen C., Cai Z., Guan X. Continuous authentication for mouse dynamics: A pattern-growth approach // IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012). IEEE, 2012. pp. 1–12.
- Shen C., Cai Z., Guan X., Maxion R. Performance evaluation of anomaly-detection algorithms for mouse dynamics // Computers and security. 2014. vol. 45. pp. 156–171.
- Antal M., Egyed‐Zsigmond E. Intrusion detection using mouse dynamics // IET Biometrics. 2019. vol. 8. no. 5. pp. 285–294.
- Fulop A., Kovacs L., Kurics T., Windhager-Pokol E. Balabit Mouse Dynamics Challenge data set. 2017. Available at: https://github.com/balabit/Mouse-Dynamics-Challenge (accessed: 16.10.2023).
- Almalki S., Chatterjee P., Roy K. Continuous authentication using mouse clickstream data analysis // Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS Proceedings 12. Springer International Publishing, 2019. pp. 76–85.
- Antal M., Denes-Fazakas L. User verification based on mouse dynamics: a comparison of public data sets // IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2019. pp. 143–148.
- Weiss G.M. Wisdm smartphone and smartwatch activity and biometrics dataset // UCI Machine Learning Repository: WISDM Smartphone and Smartwatch Activity and Biometrics Dataset Data Set. 2019. vol. 7. pp. 133190–133202.
- Матвеев Ю.Н. Исследование информативности признаков речи для систем автоматической идентификации дикторов // Известия высших учебных заведений. Приборостроение. 2013. Т. 56. № 2. С. 47–51.
- Стародубов Д.Н. Методика определения информативности признаков объектов // Алгоритмы, методы и системы обработки данных. 2008. № 13. С. 140–146.
- Frank E., Hall M., Holmes G., Kirkby R., Pfahringer B., Witten I.H., Trigg L. Weka-a machine learning workbench for data mining // Data mining and knowledge discovery handbook. 2010. pp. 1269–1277.
- Sharma P., Singh D., Singh A. Classification algorithms on a large continuous random dataset using rapid miner tool // 2nd International Conference on Electronics and Communication Systems (ICECS). IEEE, 2015. pp. 704–709.
- Жигулин П.В., Мальцев А.В., Мельников М.А., Подворчан Д.Э. Анализ сетевого трафика на основе нейронных сетей // Электронные средства и системы управления. Материалы докладов Международной научно-практической конференции. 2013. № 2. С. 44–48.
- Быкова В.В., Катаева А.В. Методы и средства анализа информативности признаков при обработке медицинских данных // Программные продукты и системы. 2016. № 2(114). С. 172–178.
- Burton A, Parikh T., Mascarenhas S., Zhang J., Voris J., Artan N.S., Li W. Driver identification and authentication with active behavior modeling // 12th International Conference on Network and Service Management (CNSM). IEEE, 2016. pp. 388–393.
- Milton L.C., Memon A. Intruder detector: A continuous authentication tool to model user behavior // IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. pp. 286–291.
- Siddiqui N., Dave R., Vanamala M., Seliya N. Machine and deep learning applications to mouse dynamics for continuous user authentication // Machine Learning and Knowledge Extraction. 2022. vol. 4. no. 2. pp. 502–518.
- Feher C., Elovici Y., Moskovitch R., Rokach L., Schclar A. User identity verification via mouse dynamics // Information Sciences. 2012. vol. 201. pp. 19–36.
- Kuzminykh I., Mathur S., Ghita B. Performance Analysis of Free Text Keystroke Authentication using XGBoost // Proc. of 6th International Conference on Computer Science, Engineering and Education Applications. (ICCSEEA). 2023. pp. 429–439.
- Agrafioti F., Bui F.M., Hatzinakos D. Secure telemedicine: Biometrics for remote and continuous patient verification // Journal of Computer Networks and Communications. 2012. vol. 2012. doi: 10.1155/2012/924791.
Supplementary files
