Quickest Intrusion Detection in Mobile Active User Authentication

被引:0
|
作者
Perera, Pramuditha [1 ]
Patel, Vishal M. [1 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, CoRE 508,94,Brett Rd, Piscataway, NJ 08854 USA
关键词
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we address the problem of quickly detecting intrusions with lower false detection rates in mobile Active Authentication (AA) systems. Bayesian and Minimax versions of the Quickest Change Detection (QCD) algorithms are introduced to quickly detect intrusions in mobile AA systems. Furthermore, we introduce a new evaluation metric for comparing the performance of different AA systems. Effectiveness of the proposed framework is demonstrated using three publicly available unconstrained AA datasets. It is shown that the proposed QCD-based intrusion detection method can perform better than many traditional AA methods in terms of latency and low false detection rates.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [32] Pass-Pic: A Mobile User Authentication
    Bajwa, Garima
    Dantu, Ram
    Aldridge, Ryan
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 195 - 195
  • [33] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [34] Quickest Anomaly Detection: A Case of Active Hypothesis Testing
    Cohen, Kobi
    Zhao, Qing
    2014 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2014, : 418 - 422
  • [35] Statistical Decision Making for Authentication and Intrusion Detection
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    EIGHTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2009, : 409 - +
  • [36] A Lightweight Intelligent Authentication Approach for Intrusion Detection
    Qiu, Xiaoying
    Li, Zhidu
    Sun, Xuan
    Xu, Tongyang
    2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,
  • [37] User profiling in intrusion detection: A review
    Peng, Jian
    Choo, Kim-Kwang Raymond
    Ashman, Helen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 72 : 14 - 27
  • [38] Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability
    Braeken, An
    Touhafi, Abdellah
    PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 39 - 46
  • [39] Screen-based active user authentication
    Fathy, Mohammed E.
    Patel, Vishal M.
    Yeh, Tom
    Zhang, Yangmuzi
    Chellappa, Rama
    Davis, Larry S.
    PATTERN RECOGNITION LETTERS, 2014, 42 : 122 - 127
  • [40] Active Learning for Intrusion Detection
    Gu, Yingjie
    Zydek, Dawid
    2014 NATIONAL WIRELESS RESEARCH COLLABORATION SYMPOSIUM (NWRCS 2014), 2014, : 117 - +