Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Implicit Authentication through Learning User Behavior

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 6531))

Included in the following conference series:

Abstract

Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. em, A Python Package for Learning Gaussian Mixture Models with Expectation Maximization,http://www.ar.media.kyoto-u.ac.jp/members/david/softwares/em/

  2. Bigun, J., Fierrez-Aguilar, J., Ortega-Garcia, J., Gonzalez-Rodriguez, J.: Combining biometric evidence for person authentication. In: Tistarelli, M., Bigun, J., Grosso, E. (eds.) Advanced Studies in Biometrics. LNCS, vol. 3161, pp. 1–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Brunelli, R., Falavigna, D.: Person identification using multiple cues. IEEE Transactions on Pattern Analysis and Machine Intelligence (1995)

    Google Scholar 

  4. Chang, K., Hightower, J., Kveton, B.: Inferring identity using accelerometers in television remote controls. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 151–167. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Damiani, M.L., Silvestri, C.: Towards movement-aware access control. In: SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS (2008)

    Google Scholar 

  6. Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: MobiSys (2010)

    Google Scholar 

  8. Furnell, S., Clarke, N., Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud and Security (2008)

    Google Scholar 

  9. Gafurov, D., Helkala, K., Søndrol, T.: Biometric gait authentication using accelerometer sensor. JCP 1(7), 51–59 (2006)

    Article  Google Scholar 

  10. Greenstadt, R., Beal, J.: Cognitive security for personal devices. In: AISec (2008)

    Google Scholar 

  11. Jakobsson, M., Juels, A.: Server-side detection of malware infection. In: NSPW (2009)

    Google Scholar 

  12. Kale, A., Cuntoor, N., Krüger, V.: Gait-Based Recognition of Humans Using Continuous HMMs. In: Proceedings of the Fifth IEEE International Conference on Automatic Face and Gesture Recognition, FGR 2002 (2002)

    Google Scholar 

  13. Leggett, G., Williams, J., Usnick, M.: Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies (1998)

    Google Scholar 

  14. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)

    Google Scholar 

  15. Moore, A.: Lecture Notes: Gaussian Mixture Models,http://www.cs.cmu.edu/afs/cs/Web/People/awm/tutorials/gmm.html

  16. Nisenson, M., Yariv, I., El-Yaniv, R., Meir, R.: Towards behaviometric security systems: Learning to identify a typist. In: Lavrač, N., Gamberger, D., Todorovski, L., Blockeel, H. (eds.) PKDD 2003. LNCS (LNAI), vol. 2838, pp. 363–374. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Rainie, L., Anderson, J.: The Future of the Internet III,http://www.pewinternet.org/Reports/2008/The-Future-of-the-Internet-III.aspx

  18. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, WiSe 2003 (2003)

    Google Scholar 

  19. Schroeder, S.: Smartphones Are Selling Like Crazy,http://mashable.com/2010/02/05/smartphones-sales/

  20. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit Authentication through Learning User Behavior. Full online version,http://midgard.cs.ucdavis.edu/~niu/papers/isc2010full.pdf

  21. Whitney, L.: Smartphones to dominate PCs in Gartner forecast,http://news.cnet.com/8301-1001_3-10434760-92.html

Download references

Author information

Authors and Affiliations

  1. Palo Alto Research Center, USA

    Elaine Shi & Richard Chow

  2. University of California, Davis, USA

    Yuan Niu

  3. FatSkunk, USA

    Markus Jakobsson

Authors
  1. Elaine Shi

    You can also search for this author inPubMed Google Scholar

  2. Yuan Niu

    You can also search for this author inPubMed Google Scholar

  3. Markus Jakobsson

    You can also search for this author inPubMed Google Scholar

  4. Richard Chow

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Center for Security and Assurance in IT (C-SAIT), Department of Computer Science, Florida State University, 32306-4530, Tallahassee, FL, USA

    Mike Burmester

  2. Department of Computer Science, University of California, Irvine, 92697-3425, CA, USA

    Gene Tsudik

  3. Center for Cryptology and Information Security (CCIS), Department of Mathematical Sciences, Florida Atlantic University, 33431-0991, Boca Raton, FL, USA

    Spyros Magliveras

  4. Mathematical Sciences Department, Florida Atlantic University, 33431-0991, Boca Raton, FL, USA

    Ivana Ilić

Rights and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, E., Niu, Y., Jakobsson, M., Chow, R. (2011). Implicit Authentication through Learning User Behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_9

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp