• Corpus ID: 239009709

Machine Learning Algorithms In User Authentication Schemes

@article{Pryor2021MachineLA,
  title={Machine Learning Algorithms In User Authentication Schemes},
  author={Laura Pryor and Rushit Dave and Naeem Seliya and Evelyn R. Sowells Boone},
  journal={ArXiv},
  year={2021},
  volume={abs/2110.07826}
}
In the past two decades, the number of mobile products being created by companies has grown exponentially. However, although these devices are constantly being upgraded with the newest features, the security measures used to protect these devices has stayed relatively the same over the past two decades. The vast difference in growth patterns between devices and their security is opening up the risk for more and more devices to easily become infiltrated by nefarious users. Working off of… 

Figures and Tables from this paper

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
In recent years, the amount of secure information being stored on mobile devices has grown exponentially. However, current security schemas for mobile devices such as physiological biometrics and
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Human activity recognition has grown in popularity with its increase of applications within daily lifestyles and medical environments. The goal of having efficient and reliable human activity

References

SHOWING 1-10 OF 28 REFERENCES
Identifying smartphone users based on how they interact with their phones
TLDR
This research study aims to provide a solution for passive and continuous authentication of smartphone users by analyzing their activity patterns when interacting with their phones by using random forests, support vector machine, and Bayes net.
Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors
TLDR
The study of smartphone sensors combining with keystroke dynamics is proposed to strengthen the password authentication, called a biometric authentication, and the classification techniques are Naïve Bayes, k Nearest Neighbors, and Random Forest.
SGFA: A Two-Factor Smartphone Authentication Mechanism Using Touch Behavioral Biometrics
TLDR
The minimum number of strokes forming a password is determined to reach a satisfying level of success rate and the biometric layer in terms of user authentication error rates are evaluated.
A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications
TLDR
Results indicate the feasibility of the continuous multiple-scope authentication framework proposed as an effective layer of security for banking applications, eventually operating jointly with conventional measures such as password-based authentication.
MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns
TLDR
The results show that different traits can be complementary and multimodal systems clearly increase the performance with accuracies ranging from 82.2% to 97.1% depending on the authentication scenario.
Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning
TLDR
It is concluded that touch pressure, touch size and coordinates effectively contribute to identifying each user in a robust au thentication system using machine learning algorithms.
Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives
TLDR
A comprehensive survey on the solutions of machine learning algorithms to improve the security of mobile phone touch screen devices including the analysis and synthesis of the algorithms and methodologies provided for those solutions.
Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication
TLDR
A novel mechanism based on the pattern lock, in which behavioral biometrics are employed to address problems of security and usability, and turns the lock pattern into public knowledge rather than a secret and leveraging touch dynamics.
DTW-KNN Implementation for Touch-based Authentication System
  • Renzhong Wang, Dan Tao
  • Computer Science
    2019 5th International Conference on Big Data Computing and Communications (BIGCOM)
  • 2019
TLDR
A touch-based authentication system to enhance the protection level of traditional authentication mechanism by adding touch pattern into the password mechanism by using the K-Nearest Neighbor with Dynamic Time Warping distance.
Palm Print Authentication on a Cloud Platform
TLDR
In this paper, palm print, a unique, permanent and trusted biometric trait, is utilized for authentication.
...
1
2
3
...