Implicit Authentication through Learning User Behavior

  • Elaine Shi
  • Yuan Niu
  • Markus Jakobsson
  • Richard Chow
Conference paper

DOI: 10.1007/978-3-642-18178-8_9

Volume 6531 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Shi E., Niu Y., Jakobsson M., Chow R. (2011) Implicit Authentication through Learning User Behavior. In: Burmester M., Tsudik G., Magliveras S., Ilić I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg

Abstract

Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication - authenticating users based on behavior patterns. We describe our model for performing implicit authentication and assess our techniques using more than two weeks of collected data from over 50 subjects.

Keywords

security usability implicit authentication behavior modelling 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Elaine Shi
    • 1
  • Yuan Niu
    • 2
  • Markus Jakobsson
    • 3
  • Richard Chow
    • 1
  1. 1.Palo Alto Research Center 
  2. 2.University of CaliforniaDavisUSA
  3. 3.FatSkunk