Hataichanok Saevanee
Continuous user authentication using multi-modal biometrics
Saevanee, Hataichanok; Clarke, Nathan; Furnell, Steven; Biscione, Valerio
Authors
Nathan Clarke
STEVEN FURNELL STEVEN.FURNELL@NOTTINGHAM.AC.UK
Professor of Cyber Security
Valerio Biscione
Abstract
© 2015 Elsevier Ltd. As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This paper proposes a novel text-based multimodal biometric approach utilizing linguistic analysis, keystroke dynamics and behavioural profiling. Experimental investigations show that users can be discriminated via their text-based entry, with an average Equal Error Rate (EER) of 3.3%. Based on these findings, a framework that is able to provide robust, continuous and transparent authentication is proposed. The framework is evaluated to examine the effectiveness of providing security and user convenience. The result showed that the framework is able to provide a 91% reduction in the number of intrusive authentication requests required for high security applications.
Journal Article Type | Article |
---|---|
Acceptance Date | Jun 3, 2015 |
Online Publication Date | Jun 12, 2015 |
Publication Date | Sep 1, 2015 |
Deposit Date | Sep 14, 2020 |
Publicly Available Date | Sep 14, 2020 |
Journal | Computers and Security |
Print ISSN | 0167-4048 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 53 |
Pages | 234-246 |
DOI | https://doi.org/10.1016/j.cose.2015.06.001 |
Public URL | https://nottingham-repository.worktribe.com/output/4868309 |
Publisher URL | https://www.sciencedirect.com/science/article/pii/S0167404815000875?via%3Dihub |
Files
Continuous user authentication using multi-modal biometrics
(255 Kb)
PDF
You might also like
Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing
(2023)
Conference Proceeding
Evaluation of Contextual and Game-Based Training for Phishing Detection
(2022)
Journal Article
Accessible authentication: Assessing the applicability for users with disabilities
(2021)
Journal Article
Developing a cyber security culture: Current practices and future needs
(2021)
Journal Article
An empirical analysis of the information security culture key factors framework
(2021)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search