access icon free Performance evaluation of continuous authentication systems

In this study, the authors will describe how performance results for continuous authentication (CA) should be reported. Most research on alleged CA is in fact periodic authentication, and performance is then reported in false match and false non-match rates. Here the authors will describe average number of impostor or genuine actions as the performance indicators, and will describe a more detailed performance reporting method. The authors’ current results have been reported in continuous authentication, based on analysis performed on two different datasets, and compared those results to the best results in comparable research, where they show that their results outperform most other known results.

Inspec keywords: authorisation; performance evaluation

Other keywords: periodic authentication; performance evaluation; average number of impostor or genuine actions; performance indicator; continuous authentication system; alleged CA; alleged continuous authentication; performance reporting method; imposter actions; genuine actions

Subjects: Data security

References

    1. 1)
    2. 2)
      • 2. Zheng, N., Paloski, A., Wang, H.: ‘An efficient user verification system via mouse movements’. 18th ACM Conf. on Computer and Communications Security (CCS‘11), 2011, pp. 139150.
    3. 3)
    4. 4)
      • 12. DeCann, B., Ross, A.: ‘De-duplication errors in a biometric system: an investigative study’. 2013 IEEE Int. Workshop on Information Forensics and Security (WIFS'13), 2013, pp. 4348.
    5. 5)
      • 18. Mondal, S., Bours, P.: ‘Continuous authentication using mouse dynamics’. Int. Conf. of the Biometrics Special Interest Group (BIOSIG'13), September 2013, pp. 112.
    6. 6)
    7. 7)
      • 3. Shen, C., Cai, Z., Guan, X.: ‘Continuous authentication for mouse dynamics: a pattern-growth approach’. 42nd Annual IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'12), June 2012, pp. 112.
    8. 8)
      • 27. Acharya, S., Fridman, A., Brennan, P., et al: ‘User authentication through biometric sensors and decision fusion’. 47th Annual Conf. on Information Sciences and Systems, March 2013, pp. 16.
    9. 9)
    10. 10)
    11. 11)
    12. 12)
    13. 13)
      • 19. Nabney, I.T.: ‘Netlab: algorithms for pattern recognition. Volume XVIII of advances in computer vision and pattern recognition’ (Springer, London, 2002).
    14. 14)
      • 9. Dowland, P.S., Furnell, S.M.: ‘A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies’. Security and Protection in Information Processing Systems. The Int. Federation for Information Processing, IFIP, Volume 147, 2004, pp. 275289.
    15. 15)
      • 7. Messerman, A., Mustafic, T., Camtepe, S.A., et al: ‘Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics’. Int. Joint Conf. on Biometrics (IJCB'11), October 2011, pp. 18.
    16. 16)
      • 24. Traore, I., Woungang, I., Obaidat, M., et al: ‘Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments’. Fourth Int. Conf. on Digital Home, November 2012, pp. 138145.
    17. 17)
    18. 18)
    19. 19)
    20. 20)
      • 11. Wayman, J.L., Jain, A., Maltoni, D., et al (Eds.): ‘Biometric systems: technology, design and performance evaluation’ (Springer, 2005).
    21. 21)
    22. 22)
      • 8. Ordal, P., Ganzhorn, D., Lu, D.V., et al: ‘Continuous identity verification through keyboard biometrics’, J. Undergrad. Res., 2005, 4, pp. 2024.
    23. 23)
      • 6. Monaco, J.V., Bakelman, N., Cha, S.H., et al: ‘Developing a keystroke biometric system for continual authentication of computer users’. Proc. European Intelligence and Security Informatics Conf. (EISIC), August 2012, pp. 210216.
    24. 24)
    25. 25)
      • 17. Bours, P., Barghouthi, H.: ‘Continuous authentication using biometric keystroke dynamics’. Norwegian Information Security Conf. (NISK), 2009, pp. 17.
    26. 26)
      • 26. Jagadeesan, H., Hsiao, M.: ‘A novel approach to design of user re-authentication systems’. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, (BTAS'09), September 2009, pp. 16.
    27. 27)
      • 13. DeCann, B., Ross, A.: ‘‘Has this person been encountered before?’: modeling an anonymous identification system’. 2012 IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW'12), 2012, pp. 8996.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0070
Loading

Related content

content/journals/10.1049/iet-bmt.2014.0070
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading