Quickest Intrusion Detection in Mobile Active User Authentication

被引:0
|
作者
Perera, Pramuditha [1 ]
Patel, Vishal M. [1 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, CoRE 508,94,Brett Rd, Piscataway, NJ 08854 USA
关键词
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we address the problem of quickly detecting intrusions with lower false detection rates in mobile Active Authentication (AA) systems. Bayesian and Minimax versions of the Quickest Change Detection (QCD) algorithms are introduced to quickly detect intrusions in mobile AA systems. Furthermore, we introduce a new evaluation metric for comparing the performance of different AA systems. Effectiveness of the proposed framework is demonstrated using three publicly available unconstrained AA datasets. It is shown that the proposed QCD-based intrusion detection method can perform better than many traditional AA methods in terms of latency and low false detection rates.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Primary User Detection in Cognitive Radio Networks Through Quickest Detection
    Khan, Muhammad Sajjad
    Koo, Insoo
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 1 - 5
  • [22] User Preferences and Situational Needs of Mobile User Authentication Methods
    Wang, Kanlun
    Zhou, Lina
    Zhang, Dongsong
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 18 - 23
  • [23] A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-hoc Networks
    Bu, Shengrong
    Yu, F. Richard
    Liu, Peter X.
    Tang, Helen
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [24] Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security
    Idrissi, Hind
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1799 - 1824
  • [25] Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security
    Hind Idrissi
    Wireless Personal Communications, 2017, 94 : 1799 - 1824
  • [26] An Assessment of User Authentication Methods in Mobile Phones
    Hui, Deborah Ooi Yee
    Yuen, Kok Kian
    Zahor, Bibi Asha Farina Binti Shikh Mohd
    Wei, Kelvin Lim Ching
    Zaaba, Zarul Fitri
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST'18), 2018, 2016
  • [27] Intrusion detection with mobile agents
    Jansen, WA
    COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1392 - 1401
  • [28] A Graphical Interface for User Authentication on Mobile Phones
    Umar, Mohammad Sarosh
    Rafiq, Mohammad Qasim
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 69 - 74
  • [29] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168
  • [30] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,