Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 6531))
Included in the following conference series:
3450Accesses
Abstract
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
em, A Python Package for Learning Gaussian Mixture Models with Expectation Maximization,http://www.ar.media.kyoto-u.ac.jp/members/david/softwares/em/
Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Combining biometric evidence for person authentication. In: Tistarelli, M., Bigun, J., Grosso, E. (eds.) Advanced Studies in Biometrics. LNCS, vol. 3161, pp. 1–18. Springer, Heidelberg (2005)
Brunelli, R., Falavigna, D.: Person identification using multiple cues. IEEE Transactions on Pattern Analysis and Machine Intelligence (1995)
Chang, K., Hightower, J., Kveton, B.: Inferring identity using accelerometers in television remote controls. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 151–167. Springer, Heidelberg (2009)
Damiani, M.L., Silvestri, C.: Towards movement-aware access control. In: SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: MobiSys (2010)
Furnell, S., Clarke, N., Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud and Security (2008)
Gafurov, D., Helkala, K., Søndrol, T.: Biometric gait authentication using accelerometer sensor. JCP 1(7), 51–59 (2006)
Greenstadt, R., Beal, J.: Cognitive security for personal devices. In: AISec (2008)
Jakobsson, M., Juels, A.: Server-side detection of malware infection. In: NSPW (2009)
Kale, A., Cuntoor, N., Krüger, V.: Gait-Based Recognition of Humans Using Continuous HMMs. In: Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition, FGR 2002 (2002)
Leggett, G., Williams, J., Usnick, M.: Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies (1998)
Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)
Moore, A.: Lecture Notes: Gaussian Mixture Models,http://www.cs.cmu.edu/afs/cs/Web/People/awm/tutorials/gmm.html
Nisenson, M., Yariv, I., El-Yaniv, R., Meir, R.: Towards behaviometric security systems: Learning to identify a typist. In: Lavrač, N., Gamberger, D., Todorovski, L., Blockeel, H. (eds.) PKDD 2003. LNCS (LNAI), vol. 2838, pp. 363–374. Springer, Heidelberg (2003)
Rainie, L., Anderson, J.: The Future of the Internet III,http://www.pewinternet.org/Reports/2008/The-Future-of-the-Internet-III.aspx
Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 2003 (2003)
Schroeder, S.: Smartphones Are Selling Like Crazy,http://mashable.com/2010/02/05/smartphones-sales/
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit Authentication through Learning User Behavior. Full online version,http://midgard.cs.ucdavis.edu/~niu/papers/isc2010full.pdf
Whitney, L.: Smartphones to dominate PCs in Gartner forecast,http://news.cnet.com/8301-1001_3-10434760-92.html
Author information
Authors and Affiliations
Palo Alto Research Center, USA
Elaine Shi & Richard Chow
University of California, Davis, USA
Yuan Niu
FatSkunk, USA
Markus Jakobsson
- Elaine Shi
You can also search for this author inPubMed Google Scholar
- Yuan Niu
You can also search for this author inPubMed Google Scholar
- Markus Jakobsson
You can also search for this author inPubMed Google Scholar
- Richard Chow
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Center for Security and Assurance in IT (C-SAIT), Department of Computer Science, Florida State University, 32306-4530, Tallahassee, FL, USA
Mike Burmester
Department of Computer Science, University of California, Irvine, 92697-3425, CA, USA
Gene Tsudik
Center for Cryptology and Information Security (CCIS), Department of Mathematical Sciences, Florida Atlantic University, 33431-0991, Boca Raton, FL, USA
Spyros Magliveras
Mathematical Sciences Department, Florida Atlantic University, 33431-0991, Boca Raton, FL, USA
Ivana Ilić
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, E., Niu, Y., Jakobsson, M., Chow, R. (2011). Implicit Authentication through Learning User Behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_9
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-642-18177-1
Online ISBN:978-3-642-18178-8
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative