
two different perspectives: proactively and reactively. When
applied proactively, risk-based authentication can be
integrated with the login process and used to block from the
beginning access to users flagged as risky. In contrast, reactive
risk-based authentication can be used to identify and revert
ongoing or completed transactions considered as risky.
Although proactive risk-based authentication may be
considered as more desirable than reactive risk-based
authentication, the cost of a misclassification error is far
greater in the former than in the latter. In other words, more
stringent accuracy requirements underlie proactive approaches
compared to reactive ones.
Actually, each category is adequate for specific scenarios.
While proactive risk based authentication is important in
situations where confidentiality is essential such as in military
or intelligence transactions, reactive risk-based authentication
may be enough in situations where integrity is the primary
concern. For instance, in online banking transactions,
malicious transactions (e.g. illegal transfer between accounts)
can be reverted (immediately) by the end of the session if the
user is classified as risky.
As shown above, the experimental evaluation of our
proposed risk-based authentication scheme yields an EER of
8.21%. Although such performance can be considered
relatively low for proactive risk-based authentication, we
believe that it is adequate for reactive risk-based
authentication. In this case, the goal is not to prevent the user
from using the system, but rather to identify malicious
sessions and trigger appropriate risk mitigation measures.
In our future work, we will focus on improving the
performance of our proposed system by studying alternative
machine learning techniques such as neural networks and
artificial immune systems. We will also expand our
experimental dataset by involving more participants.
REFERENCES
[1] Diep N. N., S. Lee, Y.-K. Lee, H.J. Lee, “Contextual Risk-based Access
Control”, Security and Management, pp. 406-412, 2007.
[2] Tubin G., “Emergence of Risk-Based Authentication in Online Financial
Services: You Can't Hide Your Lyin' IPs”, Whitepaper #V43:15N,
TowerGroup, May 2005.
[3] Obaidat M.S. and Macchairllo D. T. , "An On-line Neural Network
System for Computer Access Security", IEEE Transactions on Industrial
Electronics, Vol. 40, No.2, pp.235-242, April 1993.
[4] Enokido, T.; Takizawa, M., “Purpose-Based Information Flow Control
for Cyber Engineering”, IEEE Transactions on Industrial Electronics,
Vol. 58, No.6, pp.2216-22225, June 2011.
[5] Bergadano, F., Gunetti, D., and Picardi C., “User Authentication through
Keystroke Dynamics”, ACM Transactions on Information and System
Security, Vol. 5, No. 4, Nov. 2002, pp. 367-397.
[6] Obaidat, M.S., Sadoun, B., “Verification of Computer Users Using
Keystroke Dynamics”, IEEE Transactions on Systems, Man, and
Cybernetics, Part B, Vol. 27, No. 2, pp. 261-269, 1997.
[7] Gunetti D., and C. Picardi, “Keystroke Analysis of Free Text”, ACM
Transactions on Information and System Security, Vol. 8, No. 3, Aug.,
pp. 312-347, 2005.
[8] Aksarı, Y. and Artuner, H., “Active Authentication by Mouse
Movements”, In Proc. of the IEEE 24th Intl. Symposium on Computer
and Information Sciences (ISCIS 2009), Metu, Northern Cyprus, Sept.
2009, pp.571-574.
[9] Bours, P., Fullu, C.J., “A Login System Using Mouse Dynamics”, In
Proc. of the 5thIntl. Conference onIntelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, Sept. 12-
14, 2009.
[10] Dimmock N., Bacon J., Ingram D., and Moody K., “Risk Models for
Trust–Based Access Control”, In Proc. of 3rd Annual Conference on
Trust Management (iTrust 2005), Series LNCS, Vol. 3477, Springer,
May 2005, 426 pages.
[11] Cheng P.-C., P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A.
S. Reninger, “Fuzzy Multi–Level Security: An Experiment on
Quantified Risk–Adaptive Access Control”, IBM Research Report
RC24190, 2007
[12] Jiang C.-H., Shieh S., and Liu J.-C. 2007, “Keystroke Statistical
Learning Model for Web Authentication”, In Proc. of the 2nd ACM
Symposium on Information, Computer and Communications Security
(ASIACCS’07), Singapore, March 2007, pp. 359–361.
[13] Legget, J, Williams, G., “Dynamic Identity Verification via Keystroke
Characteristics”, International Journal on Man-Machine. Studies, Vol.
35, pp. 859-870, 1988.
[14] Dowland, P., Furnell, S., and Papadaki, M., “Keystroke Analysis as a
Method of Advanced User Authentication and Response”, In Proc. of
the 17th Intl. Conference on Information Security: Visions and
Perspectives (IFIP TC11), The Netherlands, May 07-09, pp. 215-226,
2002.
[15] Dowland, P., Singh, H., and Furnell, S., “A Preliminary Investigation of
User Authentication Using Continuous Keystroke Analysis”, In Proc. of
the 8th IFIP Annual Working Conference on Information Security
Management and Small SystemSecurity, Las Vegas, Nevada, 2001.
[16] Villani, M., Tappert, C., Giang, N., Simone, J., Fort, H. St., Sung-Hyuk
C., “Keystroke Biometric Recognition Studies On Long-Text Input
Under Ideal and Application-Oriented Conditions”, In Proc. of the IEEE
Conference on Computer Vision and Pattern Recognition Workshop
(CVPRW’06), New York, USA, June 17-22, pp. 39, 2006.
[17] Monrose, F., Rubin, A., “Authentication Via Keystroke Dynamics”, In
Proc. of the 4th ACM Conference on Computer and Communications
Security, Zurich, Switzerland, April 01-04, 1997, pp. 48-56, 1997.
[18] Revett, K., Jahankhani, H., de Magalhaes, S., and Santos, H., “A Survey
of User Authentication Based On Mouse Dynamics”, In Proc. of the 4th
Intl. Conference on Global E-Security (ICGeS 2008), London, UK, June
23-25, pp. 210-219, 2008.
[19] Bours, P., Fullu, C.J., “A Login System Using Mouse Dynamics”, In
Proc. of the 5thIntl. Conference onIntelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, Sept. 12-
14, 2009.
[20] Ahmed, A. A and Traore, I., “A New Biometric Technology Based On
Mouse Dynamics”, IEEE Transactions on Dependable and Secure
Computing 4, 3 (July), pp. 165-179, 2007.
[21] N. Friedman, D. Geiger, M. Goldszmidt, “Bayesian Network
Classifiers”, Machine Learning, Vol. 29, pp.131-163, 1997.