Quickest Intrusion Detection in Mobile Active User Authentication

被引:0
|
作者
Perera, Pramuditha [1 ]
Patel, Vishal M. [1 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, CoRE 508,94,Brett Rd, Piscataway, NJ 08854 USA
关键词
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we address the problem of quickly detecting intrusions with lower false detection rates in mobile Active Authentication (AA) systems. Bayesian and Minimax versions of the Quickest Change Detection (QCD) algorithms are introduced to quickly detect intrusions in mobile AA systems. Furthermore, we introduce a new evaluation metric for comparing the performance of different AA systems. Effectiveness of the proposed framework is demonstrated using three publicly available unconstrained AA datasets. It is shown that the proposed QCD-based intrusion detection method can perform better than many traditional AA methods in terms of latency and low false detection rates.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] QUICKEST INTRUDER DETECTION FOR MULTIPLE USER ACTIVE AUTHENTICATION
    Perera, Pramuditha
    Fierrez, Julian
    Patel, Vishal M.
    2020 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2020, : 1341 - 1345
  • [2] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [3] Towards Multiple User Active Authentication in Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 354 - 361
  • [4] Extreme Value Analysis for Mobile Active User Authentication
    Perera, Pramuditha
    Patel, Vishal M.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 346 - 353
  • [5] Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Xiaoping P.
    Tang, Helen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (09) : 3064 - 3073
  • [6] A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
    Shrestha, Rakesh
    Sung, Jong-Yeop
    Lee, Sang-Duck
    Sik-Yun, Pyung
    Choi, Dong-You
    Han, Seung-Jo
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 759 - 762
  • [7] Face-Based Multiple User Active Authentication on Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1240 - 1250
  • [8] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [9] A framework of combining intrusion detection and continuous authentication in mobile ad hoc networks
    Liu, Jie
    Yu, F. Richard
    Lung, Chung-Horng
    Tang, Helen
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1515 - +
  • [10] Novelty Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Rodriguez, Jonathan
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 837 - 842