The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Continuous Authentication in Computers
Abstract
In the Internet age, identity theft is a major security issue because contemporary authentication systems lack adequate mechanisms to detect and prevent masquerading. This chapter discusses the current authentication systems and identifies their limitations in combating masquerading attacks. Analysis of existing authentication systems reveals the factors to be considered and the steps necessary in building a good continuous authentication system. As an example, we present a continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. It employs a novel heuristic based on keyboard and mouse attributes to decipher the behavioral pattern of each individual user on the system. In the re-authentication process, the current behavior of user is compared with stored “expected” behavior. If user behavior deviates from expected behavior beyond an allowed threshold, system logs the user out of the current session, thereby preventing imposters from misusing the system. Experimental results show that the proposed methodology improves the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively. At the end of this chapter, the reader is expected to understand the dimensions involved in creating a computer based continuous authentication system and is able to frame a robust continual re-authentication system with a high degree of accuracy.
Related Content
Ajay Rawat, Shivani Gambhir.
© 2017.
19 pages.
|
Abhijit Chandra, Srideep Maity.
© 2017.
15 pages.
|
Swanirbhar Majumder, Saurabh Pal.
© 2017.
26 pages.
|
Fouad Farouk Jabri.
© 2017.
32 pages.
|
Francisco Pacheco Andrade, Teresa Coelho Moreira.
© 2017.
13 pages.
|
Swanirbhar Majumder, Smita Majumder.
© 2017.
31 pages.
|
Yuanfang Guo, Oscar C. Au, Ketan Tang.
© 2017.
20 pages.
|
|
|