Machine Learning Algorithms In User Authentication Schemes
- URL: http://arxiv.org/abs/2110.07826v1
- Date: Fri, 15 Oct 2021 02:44:43 GMT
- Title: Machine Learning Algorithms In User Authentication Schemes
- Authors: Laura Pryor, Dr. Rushit Dave, Dr. Naeem Seliya, Dr. Evelyn R Sowells
Boone
- Abstract summary: This study looks at the different Machine Learning algorithms used in user authentication schemes involving touch dynamics and device movement.
The benefits, limitations, and suggestions for future work will be thoroughly discussed throughout this paper.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: In the past two decades, the number of mobile products being created by
companies has grown exponentially. However, although these devices are
constantly being upgraded with the newest features, the security measures used
to protect these devices has stayed relatively the same over the past two
decades. The vast difference in growth patterns between devices and their
security is opening up the risk for more and more devices to easily become
infiltrated by nefarious users. Working off of previous work in the field, this
study looks at the different Machine Learning algorithms used in user
authentication schemes involving touch dynamics and device movement. This study
aims to give a comprehensive overview of the current uses of different machine
learning algorithms that are frequently used in user authentication schemas
involving touch dynamics and device movement. The benefits, limitations, and
suggestions for future work will be thoroughly discussed throughout this paper.
Related papers
- From Clicks to Security: Investigating Continuous Authentication via
Mouse Dynamics [0.0]
The study extends beyond conventional methodologies by employing a range of machine learning models.
The diverse machine learning models employed in this study demonstrate competent performance in user verification.
This research contributes to the ongoing efforts to enhance computer security and highlights the potential of leveraging user behavior, specifically mouse dynamics, in developing robust authentication systems.
arXiv Detail & Related papers (2024-03-06T16:18:02Z) - Agile gesture recognition for capacitive sensing devices: adapting
on-the-job [55.40855017016652]
We demonstrate a hand gesture recognition system that uses signals from capacitive sensors embedded into the etee hand controller.
The controller generates real-time signals from each of the wearer five fingers.
We use a machine learning technique to analyse the time series signals and identify three features that can represent 5 fingers within 500 ms.
arXiv Detail & Related papers (2023-05-12T17:24:02Z) - Evaluation of a User Authentication Schema Using Behavioral Biometrics
and Machine Learning [0.0]
This study contributes to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.
The behavioral biometrics used in this study include touch dynamics and phone movement.
We evaluate the performance of different single-modal and multi-modal combinations of the two biometrics.
arXiv Detail & Related papers (2022-05-07T05:16:34Z) - Exploration of Machine Learning Classification Models Used for
Behavioral Biometrics Authentication [0.0]
This study identifies key Machine Learning algorithms currently being used for behavioral biometric mobile authentication schemes.
It aims to provide a comprehensive review of these algorithms when used with touch dynamics and phone movement.
arXiv Detail & Related papers (2022-04-19T18:48:32Z) - Hold On and Swipe: A Touch-Movement Based Continuous Authentication
Schema based on Machine Learning [0.0]
This study aims to contribute to this innovative research by evaluating the performance of a multimodal behavioral biometric based user authentication scheme.
This study uses a fusion of two popular publicly available datasets the Hand Movement Orientation and Grasp dataset and the BioIdent dataset.
This study evaluates our model performance using three common machine learning algorithms which are Random Forest Support Vector Machine and K-Nearest Neighbor reaching accuracy rates as high as 82%.
arXiv Detail & Related papers (2022-01-21T06:51:46Z) - Realistic simulation of users for IT systems in cyber ranges [63.20765930558542]
We instrument each machine by means of an external agent to generate user activity.
This agent combines both deterministic and deep learning based methods to adapt to different environment.
We also propose conditional text generation models to facilitate the creation of conversations and documents.
arXiv Detail & Related papers (2021-11-23T10:53:29Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Federated Learning-based Active Authentication on Mobile Devices [98.23904302910022]
User active authentication on mobile devices aims to learn a model that can correctly recognize the enrolled user based on device sensor information.
We propose a novel user active authentication training, termed as Federated Active Authentication (FAA)
We show that existing FL/SL methods are suboptimal for FAA as they rely on the data to be distributed homogeneously.
arXiv Detail & Related papers (2021-04-14T22:59:08Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Federated and continual learning for classification tasks in a society
of devices [59.45414406974091]
Light Federated and Continual Consensus (LFedCon2) is a new federated and continual architecture that uses light, traditional learners.
Our method allows powerless devices (such as smartphones or robots) to learn in real time, locally, continuously, autonomously and from users.
In order to test our proposal, we have applied it in a heterogeneous community of smartphone users to solve the problem of walking recognition.
arXiv Detail & Related papers (2020-06-12T12:37:03Z) - Sensor-based Continuous Authentication of Smartphones' Users Using
Behavioral Biometrics: A Contemporary Survey [12.149800070838303]
We survey more than 140 recent behavioral biometric-based approaches for continuous user authentication.
These approaches include motion-based methods, gait-based methods, keystroke dynamics-based methods, touch gesture-based methods, voice-based methods, and multimodal-based methods.
arXiv Detail & Related papers (2020-01-23T15:07:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.