Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

05/07/2022
by   Laura Pryor, et al.
0

The amount of secure data being stored on mobile devices has grown immensely in recent years. However, the security measures protecting this data have stayed static, with few improvements being done to the vulnerabilities of current authentication methods such as physiological biometrics or passwords. Instead of these methods, behavioral biometrics has recently been researched as a solution to these vulnerable authentication methods. In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics. The behavioral biometrics used in this study include touch dynamics and phone movement, and we evaluate the performance of different single-modal and multi-modal combinations of the two biometrics. Using two publicly available datasets - BioIdent and Hand Movement Orientation and Grasp (H-MOG), this study uses seven common machine learning algorithms to evaluate performance. The algorithms used in the evaluation include Random Forest, Support Vector Machine, K-Nearest Neighbor, Naive Bayes, Logistic Regression, Multilayer Perceptron, and Long Short-Term Memory Recurrent Neural Networks, with accuracy rates reaching as high as 86

READ FULL TEXT
research
01/21/2022

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

In recent years the amount of secure information being stored on mobile ...
research
04/19/2022

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Mobile devices have been manufactured and enhanced at growing rates in t...
research
10/15/2021

Machine Learning Algorithms In User Authentication Schemes

In the past two decades, the number of mobile products being created by ...
research
10/02/2022

Comparison of Data Representations and Machine Learning Architectures for User Identification on Arbitrary Motion Sequences

Reliable and robust user identification and authentication are important...
research
12/16/2021

Context-Based Music Recommendation Algorithm Evaluation

Artificial Intelligence (AI ) has been very successful in creating and p...
research
01/18/2022

Sandbox Sample Classification Using Behavioral Indicators of Compromise

Behavioral Indicators of Compromise are associated with various automate...
research
10/15/2021

Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft

Mouse dynamics has grown in popularity as a novel irreproducible behavio...

Please sign up or login with your details

Forgot password? Click here to reset