IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Continuous Authentication in Computers

Continuous Authentication in Computers
View Sample PDF
Author(s): Harini Jagadeesan (Virginia Tech, USA)and Michael S. Hsiao (Virginia Tech, USA)
Copyright: 2012
Pages: 27
Source title: Continuous Authentication Using Biometrics: Data, Models, and Metrics
Source Author(s)/Editor(s): Issa Traore (University of Victoria, Canada)and Ahmed Awad E. Ahmed (University of Victoria, Canada)
DOI: 10.4018/978-1-61350-129-0.ch003

Purchase

View Continuous Authentication in Computers on the publisher's website for pricing and purchasing information.

Abstract

In the Internet age, identity theft is a major security issue because contemporary authentication systems lack adequate mechanisms to detect and prevent masquerading. This chapter discusses the current authentication systems and identifies their limitations in combating masquerading attacks. Analysis of existing authentication systems reveals the factors to be considered and the steps necessary in building a good continuous authentication system. As an example, we present a continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. It employs a novel heuristic based on keyboard and mouse attributes to decipher the behavioral pattern of each individual user on the system. In the re-authentication process, the current behavior of user is compared with stored “expected” behavior. If user behavior deviates from expected behavior beyond an allowed threshold, system logs the user out of the current session, thereby preventing imposters from misusing the system. Experimental results show that the proposed methodology improves the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively. At the end of this chapter, the reader is expected to understand the dimensions involved in creating a computer based continuous authentication system and is able to frame a robust continual re-authentication system with a high degree of accuracy.

Related Content

Ajay Rawat, Shivani Gambhir. © 2017. 19 pages.
Abhijit Chandra, Srideep Maity. © 2017. 15 pages.
Swanirbhar Majumder, Saurabh Pal. © 2017. 26 pages.
Fouad Farouk Jabri. © 2017. 32 pages.
Francisco Pacheco Andrade, Teresa Coelho Moreira. © 2017. 13 pages.
Swanirbhar Majumder, Smita Majumder. © 2017. 31 pages.
Yuanfang Guo, Oscar C. Au, Ketan Tang. © 2017. 20 pages.
Body Bottom