DOI QR코드

DOI QR Code

Trends in Implicit Continuous Authentication Technology

무자각 지속인증 기술 동향

  • Published : 2018.02.01

Abstract

Modern users are intensifying their use of online services every day. In addition, hackers are attempting to execute advanced attacks to steal personal information protected using existing authentication technologies. However, existing authentication methods require an explicit authentication procedure for the user, and do not conduct identity verification in the middle of the authentication session. In this paper, we introduce an implicit continuous authentication technology to overcome the limitations of existing authentication technology. Implicit continuous authentication is a technique for continuously authenticating users without explicit intervention by utilizing their behavioral and environmental information. This can improve the level of security by verifying the user's identity during the authentication session without the burden of an explicit authentication procedure. In addition, we briefly introduce the definition, key features, applicable algorithms, and recent research trends for various authentication technologies that can be used as an implicit continuous authentication technology.

Keywords

Acknowledgement

Grant : 상황인지기반 멀티팩터 인증 및 전자서명을 제공하는 범용인증플랫폼기술 개발

Supported by : 정보통신기술진흥센터

References

  1. FIDO Alliance, Accessed 2017. https://fidoalliance.org/
  2. FIDO Specifications, Accessed 2017. https://fidoalliance.org/download/
  3. W. Meng, D.S. Wong, S. Furnell, and J. Zhou, "Surveying the Development of Biometric User Authentication on Mobile Phones," IEEE Commun. Surveys Tutorials, vol. 17, no. 3, 2015, pp. 1268-1293. https://doi.org/10.1109/COMST.2014.2386915
  4. U. Mahbub, S. Sarkar, and R. Chellappa, "Partial Face Detection in the Mobile Domain," arXiv preprint arXiv: 1704.02117, 2017.
  5. S.H. Oh, G.W. Kim, and K. Lim, "Compact Deep Learned Feature-Based Face Recognition for Visual Internet of Things," J. Supercomput., 2017, pp. 1-13.
  6. S. Sarkar, V.M. Patel, and R. Chellappa, "Deep Feature-Based Face Detection on Mobile Devices," in Proc. IEEE Int. Conf. Identity Security Behavior Anal., Sendai, Japan, 2016, pp. 1-8.
  7. A. Krizhevsky, I. Sutskever, and G.E. Hinton, "Imagenet Classification with Deep Convolutional Neural Networks," in Adv. Neural Inform. Process. Syst., Lake Tahoe, NV, USA, Dec. 2012, pp. 1097-1105.
  8. K.S. Ahmad, A.S. Thosar, J.H. Nirmal, and V.S. pande, "A Unique Approach in Text Independent Speaker Recognition Using MFCC Feature Sets and Probabilistic Neural Network," In Int. Conf. Adv. Pattern Recogn., Kolkata, India, Jan. 2015, pp. 1-6.
  9. M. Muaaz and R. Mayrhofer, "Smartphone-Based Gait Recognition: From Authentication to Imitation," IEEE Trans. Mobile Comput., vol. 16, no. 11, 2017, pp. 3209-3221. https://doi.org/10.1109/TMC.2017.2686855
  10. CC. Lin, C.C. Chang, D. Liang, and C.H. Yang, "A New Non-intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users," In IEEE Int. Conf. Softw. Security Reliability, Gaithersburg, MD, USA, June 2012, pp. 245-252.
  11. Y. Zhong, Y. Deng, and G. Meltzner, "Pace Independent Mobile Gait Biometrics," In IEEE Int. Conf. Biometrics Theory, Applicat. Syst., Arlington, VA, USA, Sept. 2015, pp. 1-8.
  12. C. Jien, "Capturing Cognitive Processing Time for Active Authentication," Iowa State University of Science and Technology, USA, AFRL-RI-RS-TR-2014-035, Feb. 2014.
  13. A.A.E. Ahmed and I. Traore, "A New Biometric Technology Based on Mouse Dynamics," IEEE Trans. Dependable Secure Comput., vol. 4, no. 3, 2007, pp. 165-179. https://doi.org/10.1109/TDSC.2007.70207
  14. C. Shen, X. Guan, and J. Cai, "A Hypo-Optimum Feature Selection Strategy for Mouse Dynamics In Continuous Identity Authentication and Monitoring," In IEEE Int. Conf. Inform. Theory Inform. Security, Bejing, China, Dec. 2010, pp. 349-353.
  15. N. Zheng, A. Paloski, and H. Wang, "An Efficient User Verification System via Mouse Movements," In ACM Conf. Comput. Commun. Security, Chicago, IL, USA, Oct. 2011, pp. 1-12.
  16. X. Zhao, T. Feng, and W. Shi, "Continuous Mobile Authentication Using a Novel Graphic Touch Gesture Feature," In IEEE Int. Conf. Biometrics: Theory, Applicat. Syst., Arlington, VA, USA, 2013, pp. 1-6.
  17. F. Iqbal, H. Binsalleeh, B.C. Fung, and M. Debbabi, "Mining wRiteprints from Anonymous E-Mails for Forensic Investigation," Digital Investigation, vol. 7, no. 1-2, Oct. 2010, pp. 56-64. https://doi.org/10.1016/j.diin.2010.03.003
  18. X. Chen, P. Hao, R. Chandramouli, and K.P. Subbalakshmi, "Authorship Similarity Detection from Email Messages," In Int. Conf. Mach. Learning Data Mining Pattern Recogn., vol. 6871, 2011, pp. 375-386.
  19. U. Mahbub and R. Chellappa, "PATH: Person Authentication Using Trace Histories," In IEEE Annu. Ubiquitous Comput., Electron. Mobile Commun. Conf., New York, USA, Oct. 2016, pp. 1-8.
  20. A.A. El Masri, "Active Authentication Using Behavioral Biometrics and Machine Learning," PhD Thesis, George Mason University, 2016.
  21. M.P. Centeno, A. van Moorsel, and S. Castruccio, "Smartphone Continuous Authentication Using Deep Learning Autoencoders," In Privacy, Security Trust, Aug. 2017.
  22. IDC, "Worldwide Revenue for Security Technology Forecast to Surpass $100 Billion in 2020, According to the New IDC Worldwide Semiannual Security Spending Guide," 2016, Accessed 2017. https://www.idc.com/getdoc.jsp?containerId=prUS41851116
  23. 한국인터넷진흥원, "2017년, 보안이 4차 산업혁명 플랫폼으로 자리 잡을 것," 2016 Accessed 2017. https://www.kisa.or.kr/notice/press_View.jsp?mode=view&p_No=8&b_No=8&d_No=1518&ST=total&SV=