BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

06/15/2020
by   Yingyuan Yang, et al.
0

Implicit authentication (IA) is gaining popularity over recent years due to its use of user behavior as the main input, relieving users from explicit actions such as remembering and entering passwords. Various IA schemes have been proposed based on different behavioral and contextual features such as gait, touch, and GPS. However, existing IA schemes suffer from false positives, i.e., falsely accepting an adversary, and false negatives, i.e., falsely rejecting the legitimate user, more so than the more mature explicit authentication counterpart, due to users' behavior change. To deal with this problem, we propose BubbleMap (BMap), a framework that can be seamlessly incorporated into any existing IA system to balance between security (reducing false positives) and usability (reducing false negatives) as well as improving authentication accuracy. To evaluate the proposed framework, we implemented BMap on four state-of-the-art IA systems. We also conducted a comprehensive experiment in a real-world environment spanned two years and eight months. Most of the experimental results show that BMap can greatly enhance the IA schemes' performances in terms of authentication accuracy, security and usability, with a small amount of penalty on energy consumption.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/02/2018

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Implicit authentication (IA) is gaining popularity over recent years due...
research
06/13/2020

EchoIA: Implicit Authentication System Based on User Feedback

Implicit authentication (IA) transparently authenticates users by utiliz...
research
09/06/2021

IoT Security and Authentication schemes Based on Machine Learning: Review

With the latest developments in technology, extra and extra human beings...
research
01/21/2018

Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks

In this work, we aim at building a bridge from poor behavioral data to a...
research
08/16/2023

Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study

Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gai...
research
09/20/2022

Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling

Cyber-security analysts face an increasingly large number of alerts rece...
research
04/12/2022

Beautiful secrets: using aesthetic images to authenticate users

We propose and evaluate an authentication scheme that improves usability...

Please sign up or login with your details

Forgot password? Click here to reset