Dynamic Anonymized Evaluation for Behavioral Continuous Authentication

03/07/2019
by   Rasana Manandhar, et al.
0

Emerging technology demands reliable authentication mechanisms, particularly in interconnected systems. Current systems rely on a single moment of authentication, however continuous authentication systems assess a users identity utilizing a constant biometric analysis. Spy Hunter, a continuous authentication mechanism uses keystroke dynamics to validate users over blocks of data. This easily-incorporated periodic biometric authentication system validates genuine users and detects intruders quickly. Because it verifies users in the background, Spy Hunter is not constrained to a password box. Instead, it is flexible and can be layered with other mechanisms to provide high-level security. Where other continuous authentication techniques rely on scripted typing, Spy Hunter validates over free text in authentic environments. This is accomplished in two phases, one where the user is provided a prompt and another where the user is allowed free access to their computer. Additionally, Spy Hunter focuses on the timing of different keystrokes rather than the specific key being pressed. This allows for anonymous data to authenticate users and avoids holding personal data. Utilizing a couple K-fold cross-validation techniques, Spy Hunter is assessed based on how often the system falsely accepts an intruder, how often the system falsely rejects a genuine user, and the time it takes to validate a users identity. Spy Hunter maintains error rates below 6 keystrokes. Continuous authentication provides higher level security than one-time verification processes and Spy Hunter expands on the possibilities for behavioral analysis based on keystroke dynamics.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/08/2023

Keystroke Dynamics: Concepts, Techniques, and Applications

Reliably identifying and authenticating users remains integral to comput...
research
09/24/2019

On the Design and Analysis of a Biometric Authentication System using Keystroke Dynamics

This paper proposes a portable hardware token for user authentication, i...
research
06/16/2020

Fast Free-text Authentication via Instance-based Keystroke Dynamics

Keystroke dynamics study the way in which users input text via their key...
research
03/07/2016

Authenticating users through their arm movement patterns

In this paper, we propose four continuous authentication designs by usin...
research
10/08/2022

Study and security analysis of the Spanish identity card

The National Identity Document is a fundamental piece of documentation f...
research
02/26/2021

An Exploration of Hot-Spots in Locimetric Passwords

Locimetric authentication is a form of graphical authentication where us...
research
05/26/2023

Fast IDentity Online with Anonymous Credentials (FIDO-AC)

Web authentication is a critical component of today's Internet and the d...

Please sign up or login with your details

Forgot password? Click here to reset