Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Â
Behavior-Based Authentication System Based on Smartphone Life-Logs Data
1. Behavior-Based Authentication System
Based on Smartphone Life-Logs Data
School of Electronics & Computer Engineering
Chonnam National University
Priagung Khusumanegara
Advisor : Professor Deok Jai Choi
2. Contents
â Introduction
â Contributions
â General Steps of Our Work
â Data Collection
â Used Data
â Preprocessing
â Data Cleansing
â Data Transformations
â Feature Extraction
â Feature Normalization
â Feature Selection
â User Behavior Model
â Similarity Measure
â Experimental Results
â Conclusions
â Future Works
2
3. Introduction
â Smartphone is not only used for common telecommunications
such as calling and texting, but also for online activity such as
sending and receiving emails, internet banking, social media, etc.
â The smartphone may store sensitive information, such as credit
card number, personal password, mobile banking, etc.
â Therefore, it is very important to develop a user authentication
system that can be used to protect the smartphone from illegal
users.
3
5. Introduction (Contâd)
â Behavior-based authentication method is an authentication
method that takes into account the way of a user interacts with
his smartphone.
â In behavior-based authentication
1. We do not need to remember the password or PIN
2. We do not need anxious about it can be lost or stolen
3. We can check legality of the user after login
5
6. Introduction (Contâd)
Related Works:
1. Implicit Authentication for Mobile Devices [2009]
2. Implicit Authentication Through Learning User Behavior [2011]
3. Multi-sensor Authentication to Improve Smartphone Security
[2015]
4. Continuous Touchscreen Mobile Authentication Using Several
Gestures [2016]
6
7. Contributions
1. We utilized the rich life logs dataset of smartphone users that are
collected from multiple sensors and smartphone database
1. We extracted several key features to represent smartphone usersâ
behavior including two aspects: 1) Userâs Behavior and 2)
Environment.
1. We selected a subset of smartphone user behavior features that
relevant with smartphone user behavior identification.
1. We built a user behavior model that can characterize the
smartphone userâs behavior pattern.
7
9. Data Collection
â 47 students followed our study and each student was equipped
with Android smartphone running life logs data collection
application during around 2 months.
â Our life logs data collection application that is intended for
Android smartphone was built based on Funf Open Sensing
Framework.
â Funf Open Sensing Framework is an open source Android-
based extensible sensing framework for Android smartphone.
9
10. Used Data
â The collected smartphone life logs data of 47 participants are stored in an
archive file, which has size 4.25 GB. After we extracted the archive file,
there are 47 folders within different name in which each folder contains the
smartphone life logs data of each participant.
â Used data to identify smartphone user behavior have to meet three
requirements following below:
1. Have a good conditionâ
2. Enough to be used in behavior analysisâ
3. Have correlation with human behavior (based on previous studies)
10
11. Used Data
Have a good condition
Based on data condition
⢠We found one folder, which does not has data (empty)
⢠Four folders contains malformed smartphone life logs data
11
12. Used Data
Enough to be used in behavior analysis
â There are five participants who have less than one month in
duration of data collection, consequently they are discarded since
they are not enough to be processed in smartphone user behavior
analysis.
12
13. Used Data
Have correlation with behavior (based on previous researches)
⢠Our life logs data collection application uses 19 kind of probes to
collect specific information.
⢠In this study, we only use probes that have correlation with user
behavior based on previous studies.
13
14. Used Data
Have correlation with behavior (based on previous
researches)
⢠Our life logs data collection application uses 19 kind
of probes to collect specific information.
⢠In this study, we only use probes that have correlation
with user behavior based on previous researches.
14
15. Data Preprocessing
âData Cleansing
â It works to âcleanâ the smartphone life logs data by removing
duplicate and outlier values.
âData Transformationâ
âIt is used to transform the data from *db format to csv files.
âWhen we load all of life logs data of 37 participants which have
size 14.22 GB in the same time, it will spend resource of our
computer such as processor and RAM.
15
16. Feature Extraction
â The characteristics of smartphone users can be reflected based
on their behavior and environment.
E.g.: different number of communication, different environment,
different activity, and etc.
â Therefore, we classify the extracted features into two categories,
namely behavior feature and environment feature.
16
17. Data Preprocessing
â The characteristics of smartphone users can be reflected based
on their behavior and environment.
E.g.: different number of communication, different environment,
different activity, and etc.
â Therefore, we classify the extracted features into two categories,
namely behavior feature and environment feature.
17
18. Data Preprocessing
â The characteristics of smartphone users can be
reflected based on their behavior and
environment. âE.g.: different number of
communication, different environment, different
activity, and etc.
â Therefore, we classify the extracted features into two
categories, namely behavior feature and environment
feature.
18
19. Data Preprocessing
â Behavior features means the features that coming from userâs
behavior.
â Environment features means the features that coming from userâs
environment.
19
21. Feature Extraction
â Behavior features means the features that coming from
userâs behavior.
â Environment features means the features that coming
from userâs environment.
21
23. Feature Selection
âRandom forest algorithm works as a large collection of decision
tress.
âIt works based on the bagging technique which means that is
combination of learning models to increase the classification
accuracy.
âThe reasons why we conducted random forest technique
1. Very accurate
2. Rarely over-fitting
3. Can handle mixed data (continuous / categorical)
4. Naturally multivariate.
23
25. User Behavior Model
â A user behavior model is formed based on observation of the userâs
behavior pattern.
â We focus on how to build a user behavior model that characterize
the user's behavior pattern so that it can be used to find the
differences among the users.
E.g.: How frequently smartphone user makes phone calls, how frequently
the smartphone user sends a message, how frequently smartphone user
charge his phone, etc.
25
26. User Behavior Model
â
26
X Frequency
1 1
2 2
3 1
4 1
Total Frequency 5
X Probability Mass Function
1 1/5 =0.2
2 2/5 =0.4
3 1/5 =0.2
4 1/5 =0.2
28. User Behavior Model
â The problem of our model is the length of probability mass function
of each day may be different.
â So to overcome that problem, we use bin to make same length of
probability mass function for each day.
28
34. Experimental Setup
We used smartphone life logs data of 37 students (men and women)
that were collected during 42 days (6 weeks)
We divided our dataset into two parts which are
Enrolment data : data that were collected from day-1 up to day-21 for
each user
Verification data :data that were collected from day-22 up to day-42
for each user
34
37. Conclusion
â We collected smartphone life-logs data of 47 students during continuous period in
around two months.
â We extracted several key features to represent smartphone usersâ behavior including
two aspects: 1) Userâs Behavior and 2) Environment, and then selected a subset of
these features that relevant with smartphone user identification.
â We built a user behavior model that characterize userâs behavior patterns to make a
userâs profile.
â Our approach can achieve best performance with Equal Error Rate (EER) equals to
7.05% by using Mahalanobis distance.
â The low value Equal Error Rate (EER) indicates that our behavior-based
authentication provided good security post login.
37
38. Conclusion
â In point of view of window size, our user behavior model relied one
days as the windows size, in the future we have a plan to
experiment with different windows size such as two days, three
days, etc. in order to analyze the influence of window size in our
user behavior model.
â In our experiment, we compared the days between current days in
same week, in the future we plan to compare the same day however
in different week.
38