SlideShare a Scribd company logo
1 of 38
Behavior-Based Authentication System
Based on Smartphone Life-Logs Data
School of Electronics & Computer Engineering
Chonnam National University
Priagung Khusumanegara
Advisor : Professor Deok Jai Choi
Contents
⌘ Introduction
⌘ Contributions
⌘ General Steps of Our Work
⌘ Data Collection
⌘ Used Data
⌘ Preprocessing
⌘ Data Cleansing
⌘ Data Transformations
⌘ Feature Extraction
⌘ Feature Normalization
⌘ Feature Selection
⌘ User Behavior Model
⌘ Similarity Measure
⌘ Experimental Results
⌘ Conclusions
⌘ Future Works
2
Introduction
⌘ Smartphone is not only used for common telecommunications
such as calling and texting, but also for online activity such as
sending and receiving emails, internet banking, social media, etc.
⌘ The smartphone may store sensitive information, such as credit
card number, personal password, mobile banking, etc.
⌘ Therefore, it is very important to develop a user authentication
system that can be used to protect the smartphone from illegal
users.
3
Introduction (Cont’d)
The current authentication methods can be classified into 3 types:​
4
Figure: Authentication Methods
Introduction (Cont’d)
⌘ Behavior-based authentication method is an authentication
method that takes into account the way of a user interacts with
his smartphone.
⌘ In behavior-based authentication
1. We do not need to remember the password or PIN
2. We do not need anxious about it can be lost or stolen
3. We can check legality of the user after login
5
Introduction (Cont’d)
Related Works:
1. Implicit Authentication for Mobile Devices [2009]
2. Implicit Authentication Through Learning User Behavior [2011]
3. Multi-sensor Authentication to Improve Smartphone Security
[2015]
4. Continuous Touchscreen Mobile Authentication Using Several
Gestures [2016]
6
Contributions
1. We utilized the rich life logs dataset of smartphone users that are
collected from multiple sensors and smartphone database
1. We extracted several key features to represent smartphone users’
behavior including two aspects: 1) User’s Behavior and 2)
Environment.
1. We selected a subset of smartphone user behavior features that
relevant with smartphone user behavior identification.
1. We built a user behavior model that can characterize the
smartphone user’s behavior pattern.
7
General Steps of Our Work
8
Data Collection
⌘ 47 students followed our study and each student was equipped
with Android smartphone running life logs data collection
application during around 2 months.
⌘ Our life logs data collection application that is intended for
Android smartphone was built based on Funf Open Sensing
Framework.
⌘ Funf Open Sensing Framework is an open source Android-
based extensible sensing framework for Android smartphone.
9
Used Data
⌘ The collected smartphone life logs data of 47 participants are stored in an
archive file, which has size 4.25 GB. After we extracted the archive file,
there are 47 folders within different name in which each folder contains the
smartphone life logs data of each participant.
⌘ Used data to identify smartphone user behavior have to meet three
requirements following below:
1. Have a good condition​
2. Enough to be used in behavior analysis​
3. Have correlation with human behavior (based on previous studies)
10
Used Data
Have a good condition
Based on data condition
➢ We found one folder, which does not has data (empty)
➢ Four folders contains malformed smartphone life logs data
11
Used Data
Enough to be used in behavior analysis
⌘ There are five participants who have less than one month in
duration of data collection, consequently they are discarded since
they are not enough to be processed in smartphone user behavior
analysis.
12
Used Data
Have correlation with behavior (based on previous researches)
➢ Our life logs data collection application uses 19 kind of probes to
collect specific information.
➢ In this study, we only use probes that have correlation with user
behavior based on previous studies.
13
Used Data
Have correlation with behavior (based on previous
researches)
➢ Our life logs data collection application uses 19 kind
of probes to collect specific information.
➢ In this study, we only use probes that have correlation
with user behavior based on previous researches.
14
Data Preprocessing
⌘Data Cleansing
⌘ It works to “clean” the smartphone life logs data by removing
duplicate and outlier values.
⌘Data Transformation​
⌘It is used to transform the data from *db format to csv files.
⌘When we load all of life logs data of 37 participants which have
size 14.22 GB in the same time, it will spend resource of our
computer such as processor and RAM.
15
Feature Extraction
⌘ The characteristics of smartphone users can be reflected based
on their behavior and environment.
E.g.: different number of communication, different environment,
different activity, and etc.
⌘ Therefore, we classify the extracted features into two categories,
namely behavior feature and environment feature.
16
Data Preprocessing
● The characteristics of smartphone users can be reflected based
on their behavior and environment.
E.g.: different number of communication, different environment,
different activity, and etc.
● Therefore, we classify the extracted features into two categories,
namely behavior feature and environment feature.
17
Data Preprocessing
● The characteristics of smartphone users can be
reflected based on their behavior and
environment. ​E.g.: different number of
communication, different environment, different
activity, and etc.
● Therefore, we classify the extracted features into two
categories, namely behavior feature and environment
feature.
18
Data Preprocessing
● Behavior features means the features that coming from user’s
behavior.
● Environment features means the features that coming from user’s
environment.
19
Feature Normalization
20
Feature Extraction
● Behavior features means the features that coming from
user’s behavior.
● Environment features means the features that coming
from user’s environment.
21
Feature Extraction
Behavior Feature
(27 features)
Environment Feature
(2 features)
22
Feature Selection
⌘Random forest algorithm works as a large collection of decision
tress.
⌘It works based on the bagging technique which means that is
combination of learning models to increase the classification
accuracy.
⌘The reasons why we conducted random forest technique
1. Very accurate
2. Rarely over-fitting
3. Can handle mixed data (continuous / categorical)
4. Naturally multivariate.
23
Feature Selection
24
Figure: Results of Random Forest Scoring Technique
User Behavior Model
● A user behavior model is formed based on observation of the user’s
behavior pattern.
● We focus on how to build a user behavior model that characterize
the user's behavior pattern so that it can be used to find the
differences among the users.
E.g.: How frequently smartphone user makes phone calls, how frequently
the smartphone user sends a message, how frequently smartphone user
charge his phone, etc.
25
User Behavior Model
●
26
X Frequency
1 1
2 2
3 1
4 1
Total Frequency 5
X Probability Mass Function
1 1/5 =0.2
2 2/5 =0.4
3 1/5 =0.2
4 1/5 =0.2
User Behavior Model
●
27
User Behavior Model
● The problem of our model is the length of probability mass function
of each day may be different.
● So to overcome that problem, we use bin to make same length of
probability mass function for each day.
28
User Behavior Model
●
29
User Behavior Model
30
USER 1
USER 2
DAY 1 DAY 2
Similarity Measure
●
31
Similarity Measure
●
32
Similarity Measure
●
33
Experimental Setup
We used smartphone life logs data of 37 students (men and women)
that were collected during 42 days (6 weeks)
We divided our dataset into two parts which are
Enrolment data : data that were collected from day-1 up to day-21 for
each user
Verification data :data that were collected from day-22 up to day-42
for each user
34
Experimental Setup
●
35
Experimental Results
36
Conclusion
⌘ We collected smartphone life-logs data of 47 students during continuous period in
around two months.
⌘ We extracted several key features to represent smartphone users’ behavior including
two aspects: 1) User’s Behavior and 2) Environment, and then selected a subset of
these features that relevant with smartphone user identification.
⌘ We built a user behavior model that characterize user’s behavior patterns to make a
user’s profile.
⌘ Our approach can achieve best performance with Equal Error Rate (EER) equals to
7.05% by using Mahalanobis distance.
⌘ The low value Equal Error Rate (EER) indicates that our behavior-based
authentication provided good security post login.
37
Conclusion
● In point of view of window size, our user behavior model relied one
days as the windows size, in the future we have a plan to
experiment with different windows size such as two days, three
days, etc. in order to analyze the influence of window size in our
user behavior model.
● In our experiment, we compared the days between current days in
same week, in the future we plan to compare the same day however
in different week.
38

More Related Content

What's hot

Paper id 42201614
Paper id 42201614Paper id 42201614
Paper id 42201614IJRAT
 
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)Journal For Research
 
Automatic Seed Classification by Shape and Color Features using Machine Visio...
Automatic Seed Classification by Shape and Color Features using Machine Visio...Automatic Seed Classification by Shape and Color Features using Machine Visio...
Automatic Seed Classification by Shape and Color Features using Machine Visio...Editor IJCATR
 
IRJET - Disease Detection in Plant using Machine Learning
IRJET -  	  Disease Detection in Plant using Machine LearningIRJET -  	  Disease Detection in Plant using Machine Learning
IRJET - Disease Detection in Plant using Machine LearningIRJET Journal
 
La2418611866
La2418611866La2418611866
La2418611866IJERA Editor
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusioneSAT Publishing House
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationseSAT Journals
 
an iot based smart solution for leaf disease detection
an iot based smart solution for leaf disease detectionan iot based smart solution for leaf disease detection
an iot based smart solution for leaf disease detectionCloudTechnologies
 
INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING OF AGRICULTURAL...
INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING     OF AGRICULTURAL...INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING     OF AGRICULTURAL...
INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING OF AGRICULTURAL...chaitanya ivvala
 
Segmentation of unhealthy region of plant leaf using image processing techniques
Segmentation of unhealthy region of plant leaf using image processing techniquesSegmentation of unhealthy region of plant leaf using image processing techniques
Segmentation of unhealthy region of plant leaf using image processing techniqueseSAT Journals
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...
IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...
IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...IRJET Journal
 
IRJET- Detection and Classification of Leaf Diseases
IRJET-  	  Detection and Classification of Leaf DiseasesIRJET-  	  Detection and Classification of Leaf Diseases
IRJET- Detection and Classification of Leaf DiseasesIRJET Journal
 
Automated Crop Inspection and Pest Control Using Image Processing
Automated Crop Inspection and Pest Control Using Image ProcessingAutomated Crop Inspection and Pest Control Using Image Processing
Automated Crop Inspection and Pest Control Using Image ProcessingIJERDJOURNAL
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentseSAT Journals
 
Identification of Disease in Leaves using Genetic Algorithm
Identification of Disease in Leaves using Genetic AlgorithmIdentification of Disease in Leaves using Genetic Algorithm
Identification of Disease in Leaves using Genetic Algorithmijtsrd
 
A study of multimodal biometric system
A study of multimodal biometric systemA study of multimodal biometric system
A study of multimodal biometric systemeSAT Publishing House
 

What's hot (20)

F010423541
F010423541F010423541
F010423541
 
Paper id 42201614
Paper id 42201614Paper id 42201614
Paper id 42201614
 
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
 
Automatic Seed Classification by Shape and Color Features using Machine Visio...
Automatic Seed Classification by Shape and Color Features using Machine Visio...Automatic Seed Classification by Shape and Color Features using Machine Visio...
Automatic Seed Classification by Shape and Color Features using Machine Visio...
 
xtremes
xtremesxtremes
xtremes
 
IRJET - Disease Detection in Plant using Machine Learning
IRJET -  	  Disease Detection in Plant using Machine LearningIRJET -  	  Disease Detection in Plant using Machine Learning
IRJET - Disease Detection in Plant using Machine Learning
 
La2418611866
La2418611866La2418611866
La2418611866
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
an iot based smart solution for leaf disease detection
an iot based smart solution for leaf disease detectionan iot based smart solution for leaf disease detection
an iot based smart solution for leaf disease detection
 
INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING OF AGRICULTURAL...
INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING     OF AGRICULTURAL...INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING     OF AGRICULTURAL...
INTERNET OF THINGS IMPLEMENTATION FOR WIRELESS MONITORING OF AGRICULTURAL...
 
Segmentation of unhealthy region of plant leaf using image processing techniques
Segmentation of unhealthy region of plant leaf using image processing techniquesSegmentation of unhealthy region of plant leaf using image processing techniques
Segmentation of unhealthy region of plant leaf using image processing techniques
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...
IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...
IRJET- Design, Development and Evaluation of a Grading System for Peeled Pist...
 
IRJET- Detection and Classification of Leaf Diseases
IRJET-  	  Detection and Classification of Leaf DiseasesIRJET-  	  Detection and Classification of Leaf Diseases
IRJET- Detection and Classification of Leaf Diseases
 
Automated Crop Inspection and Pest Control Using Image Processing
Automated Crop Inspection and Pest Control Using Image ProcessingAutomated Crop Inspection and Pest Control Using Image Processing
Automated Crop Inspection and Pest Control Using Image Processing
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
Identification of Disease in Leaves using Genetic Algorithm
Identification of Disease in Leaves using Genetic AlgorithmIdentification of Disease in Leaves using Genetic Algorithm
Identification of Disease in Leaves using Genetic Algorithm
 
A study of multimodal biometric system
A study of multimodal biometric systemA study of multimodal biometric system
A study of multimodal biometric system
 

Similar to Behavior-Based Authentication System Based on Smartphone Life-Logs Data

BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
 
Human Activity Recognition in Android
Human Activity Recognition in AndroidHuman Activity Recognition in Android
Human Activity Recognition in AndroidSurbhi Jain
 
A04820104
A04820104A04820104
A04820104IOSR-JEN
 
IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...
IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...
IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...IRJET Journal
 
A Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User GoalsA Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User GoalsPradeep K. Venkatesh
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
IRJET- Detection and Identification of Artificially Ripened Fruits using ...
IRJET-  	  Detection and Identification of Artificially Ripened Fruits using ...IRJET-  	  Detection and Identification of Artificially Ripened Fruits using ...
IRJET- Detection and Identification of Artificially Ripened Fruits using ...IRJET Journal
 
A Novel Method for Creating and Recognizing User Behavior Profiles
A Novel Method for Creating and Recognizing User Behavior ProfilesA Novel Method for Creating and Recognizing User Behavior Profiles
A Novel Method for Creating and Recognizing User Behavior ProfilesIJMER
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityIRJET Journal
 
IRJET- Survey on Various Techniques of Attendance marking and Attention D...
IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...
IRJET- Survey on Various Techniques of Attendance marking and Attention D...IRJET Journal
 
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...Erasmo Purificato
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...IRJET Journal
 
Android application for detection of leaf disease (Using Image processing and...
Android application for detection of leaf disease (Using Image processing and...Android application for detection of leaf disease (Using Image processing and...
Android application for detection of leaf disease (Using Image processing and...IRJET Journal
 
Hybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemHybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemBouneffouf Djallel
 
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...IRJET Journal
 
I - FABRIC HEALTH MONITORING MODEL BY USING TECHNOLOGY
I - FABRIC  HEALTH  MONITORING  MODEL  BY USING TECHNOLOGYI - FABRIC  HEALTH  MONITORING  MODEL  BY USING TECHNOLOGY
I - FABRIC HEALTH MONITORING MODEL BY USING TECHNOLOGYabiabishek5451
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity RecognitionIRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 

Similar to Behavior-Based Authentication System Based on Smartphone Life-Logs Data (20)

BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
 
D56021216
D56021216D56021216
D56021216
 
Human Activity Recognition in Android
Human Activity Recognition in AndroidHuman Activity Recognition in Android
Human Activity Recognition in Android
 
A04820104
A04820104A04820104
A04820104
 
IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...
IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...
IRJET- User Behavior Analysis on Social Media Data using Sentiment Analysis o...
 
A Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User GoalsA Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User Goals
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
IRJET- Detection and Identification of Artificially Ripened Fruits using ...
IRJET-  	  Detection and Identification of Artificially Ripened Fruits using ...IRJET-  	  Detection and Identification of Artificially Ripened Fruits using ...
IRJET- Detection and Identification of Artificially Ripened Fruits using ...
 
A Novel Method for Creating and Recognizing User Behavior Profiles
A Novel Method for Creating and Recognizing User Behavior ProfilesA Novel Method for Creating and Recognizing User Behavior Profiles
A Novel Method for Creating and Recognizing User Behavior Profiles
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine Similarity
 
IRJET- Survey on Various Techniques of Attendance marking and Attention D...
IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...
IRJET- Survey on Various Techniques of Attendance marking and Attention D...
 
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
Android application for detection of leaf disease (Using Image processing and...
Android application for detection of leaf disease (Using Image processing and...Android application for detection of leaf disease (Using Image processing and...
Android application for detection of leaf disease (Using Image processing and...
 
Hybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemHybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender system
 
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
 
I - FABRIC HEALTH MONITORING MODEL BY USING TECHNOLOGY
I - FABRIC  HEALTH  MONITORING  MODEL  BY USING TECHNOLOGYI - FABRIC  HEALTH  MONITORING  MODEL  BY USING TECHNOLOGY
I - FABRIC HEALTH MONITORING MODEL BY USING TECHNOLOGY
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity Recognition
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 

More from Lippo Group Digital

The Cognitive Net is Coming
The Cognitive Net is ComingThe Cognitive Net is Coming
The Cognitive Net is ComingLippo Group Digital
 
The future internet web 3.0
The future internet  web 3.0The future internet  web 3.0
The future internet web 3.0Lippo Group Digital
 
A web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideA web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideLippo Group Digital
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerLippo Group Digital
 
Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)Lippo Group Digital
 
Decision tree and random forest
Decision tree and random forestDecision tree and random forest
Decision tree and random forestLippo Group Digital
 
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Lippo Group Digital
 
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Lippo Group Digital
 
Analisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanAnalisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanLippo Group Digital
 

More from Lippo Group Digital (13)

Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Feature Selection
Feature Selection Feature Selection
Feature Selection
 
Fall detection
Fall detectionFall detection
Fall detection
 
The Cognitive Net is Coming
The Cognitive Net is ComingThe Cognitive Net is Coming
The Cognitive Net is Coming
 
The future internet web 3.0
The future internet  web 3.0The future internet  web 3.0
The future internet web 3.0
 
A web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideA web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guide
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
 
Distance function
Distance functionDistance function
Distance function
 
Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)Caching in Information Centric Network (ICN)
Caching in Information Centric Network (ICN)
 
Decision tree and random forest
Decision tree and random forestDecision tree and random forest
Decision tree and random forest
 
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
 
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
 
Analisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanAnalisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatan
 

Recently uploaded

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationBoston Institute of Analytics
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 

Recently uploaded (20)

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Dwarka Sector 15 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Data Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health ClassificationData Science Project: Advancements in Fetal Health Classification
Data Science Project: Advancements in Fetal Health Classification
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 

Behavior-Based Authentication System Based on Smartphone Life-Logs Data

  • 1. Behavior-Based Authentication System Based on Smartphone Life-Logs Data School of Electronics & Computer Engineering Chonnam National University Priagung Khusumanegara Advisor : Professor Deok Jai Choi
  • 2. Contents ⌘ Introduction ⌘ Contributions ⌘ General Steps of Our Work ⌘ Data Collection ⌘ Used Data ⌘ Preprocessing ⌘ Data Cleansing ⌘ Data Transformations ⌘ Feature Extraction ⌘ Feature Normalization ⌘ Feature Selection ⌘ User Behavior Model ⌘ Similarity Measure ⌘ Experimental Results ⌘ Conclusions ⌘ Future Works 2
  • 3. Introduction ⌘ Smartphone is not only used for common telecommunications such as calling and texting, but also for online activity such as sending and receiving emails, internet banking, social media, etc. ⌘ The smartphone may store sensitive information, such as credit card number, personal password, mobile banking, etc. ⌘ Therefore, it is very important to develop a user authentication system that can be used to protect the smartphone from illegal users. 3
  • 4. Introduction (Cont’d) The current authentication methods can be classified into 3 types:​ 4 Figure: Authentication Methods
  • 5. Introduction (Cont’d) ⌘ Behavior-based authentication method is an authentication method that takes into account the way of a user interacts with his smartphone. ⌘ In behavior-based authentication 1. We do not need to remember the password or PIN 2. We do not need anxious about it can be lost or stolen 3. We can check legality of the user after login 5
  • 6. Introduction (Cont’d) Related Works: 1. Implicit Authentication for Mobile Devices [2009] 2. Implicit Authentication Through Learning User Behavior [2011] 3. Multi-sensor Authentication to Improve Smartphone Security [2015] 4. Continuous Touchscreen Mobile Authentication Using Several Gestures [2016] 6
  • 7. Contributions 1. We utilized the rich life logs dataset of smartphone users that are collected from multiple sensors and smartphone database 1. We extracted several key features to represent smartphone users’ behavior including two aspects: 1) User’s Behavior and 2) Environment. 1. We selected a subset of smartphone user behavior features that relevant with smartphone user behavior identification. 1. We built a user behavior model that can characterize the smartphone user’s behavior pattern. 7
  • 8. General Steps of Our Work 8
  • 9. Data Collection ⌘ 47 students followed our study and each student was equipped with Android smartphone running life logs data collection application during around 2 months. ⌘ Our life logs data collection application that is intended for Android smartphone was built based on Funf Open Sensing Framework. ⌘ Funf Open Sensing Framework is an open source Android- based extensible sensing framework for Android smartphone. 9
  • 10. Used Data ⌘ The collected smartphone life logs data of 47 participants are stored in an archive file, which has size 4.25 GB. After we extracted the archive file, there are 47 folders within different name in which each folder contains the smartphone life logs data of each participant. ⌘ Used data to identify smartphone user behavior have to meet three requirements following below: 1. Have a good condition​ 2. Enough to be used in behavior analysis​ 3. Have correlation with human behavior (based on previous studies) 10
  • 11. Used Data Have a good condition Based on data condition ➢ We found one folder, which does not has data (empty) ➢ Four folders contains malformed smartphone life logs data 11
  • 12. Used Data Enough to be used in behavior analysis ⌘ There are five participants who have less than one month in duration of data collection, consequently they are discarded since they are not enough to be processed in smartphone user behavior analysis. 12
  • 13. Used Data Have correlation with behavior (based on previous researches) ➢ Our life logs data collection application uses 19 kind of probes to collect specific information. ➢ In this study, we only use probes that have correlation with user behavior based on previous studies. 13
  • 14. Used Data Have correlation with behavior (based on previous researches) ➢ Our life logs data collection application uses 19 kind of probes to collect specific information. ➢ In this study, we only use probes that have correlation with user behavior based on previous researches. 14
  • 15. Data Preprocessing ⌘Data Cleansing ⌘ It works to “clean” the smartphone life logs data by removing duplicate and outlier values. ⌘Data Transformation​ ⌘It is used to transform the data from *db format to csv files. ⌘When we load all of life logs data of 37 participants which have size 14.22 GB in the same time, it will spend resource of our computer such as processor and RAM. 15
  • 16. Feature Extraction ⌘ The characteristics of smartphone users can be reflected based on their behavior and environment. E.g.: different number of communication, different environment, different activity, and etc. ⌘ Therefore, we classify the extracted features into two categories, namely behavior feature and environment feature. 16
  • 17. Data Preprocessing ● The characteristics of smartphone users can be reflected based on their behavior and environment. E.g.: different number of communication, different environment, different activity, and etc. ● Therefore, we classify the extracted features into two categories, namely behavior feature and environment feature. 17
  • 18. Data Preprocessing ● The characteristics of smartphone users can be reflected based on their behavior and environment. ​E.g.: different number of communication, different environment, different activity, and etc. ● Therefore, we classify the extracted features into two categories, namely behavior feature and environment feature. 18
  • 19. Data Preprocessing ● Behavior features means the features that coming from user’s behavior. ● Environment features means the features that coming from user’s environment. 19
  • 21. Feature Extraction ● Behavior features means the features that coming from user’s behavior. ● Environment features means the features that coming from user’s environment. 21
  • 22. Feature Extraction Behavior Feature (27 features) Environment Feature (2 features) 22
  • 23. Feature Selection ⌘Random forest algorithm works as a large collection of decision tress. ⌘It works based on the bagging technique which means that is combination of learning models to increase the classification accuracy. ⌘The reasons why we conducted random forest technique 1. Very accurate 2. Rarely over-fitting 3. Can handle mixed data (continuous / categorical) 4. Naturally multivariate. 23
  • 24. Feature Selection 24 Figure: Results of Random Forest Scoring Technique
  • 25. User Behavior Model ● A user behavior model is formed based on observation of the user’s behavior pattern. ● We focus on how to build a user behavior model that characterize the user's behavior pattern so that it can be used to find the differences among the users. E.g.: How frequently smartphone user makes phone calls, how frequently the smartphone user sends a message, how frequently smartphone user charge his phone, etc. 25
  • 26. User Behavior Model ● 26 X Frequency 1 1 2 2 3 1 4 1 Total Frequency 5 X Probability Mass Function 1 1/5 =0.2 2 2/5 =0.4 3 1/5 =0.2 4 1/5 =0.2
  • 28. User Behavior Model ● The problem of our model is the length of probability mass function of each day may be different. ● So to overcome that problem, we use bin to make same length of probability mass function for each day. 28
  • 30. User Behavior Model 30 USER 1 USER 2 DAY 1 DAY 2
  • 34. Experimental Setup We used smartphone life logs data of 37 students (men and women) that were collected during 42 days (6 weeks) We divided our dataset into two parts which are Enrolment data : data that were collected from day-1 up to day-21 for each user Verification data :data that were collected from day-22 up to day-42 for each user 34
  • 37. Conclusion ⌘ We collected smartphone life-logs data of 47 students during continuous period in around two months. ⌘ We extracted several key features to represent smartphone users’ behavior including two aspects: 1) User’s Behavior and 2) Environment, and then selected a subset of these features that relevant with smartphone user identification. ⌘ We built a user behavior model that characterize user’s behavior patterns to make a user’s profile. ⌘ Our approach can achieve best performance with Equal Error Rate (EER) equals to 7.05% by using Mahalanobis distance. ⌘ The low value Equal Error Rate (EER) indicates that our behavior-based authentication provided good security post login. 37
  • 38. Conclusion ● In point of view of window size, our user behavior model relied one days as the windows size, in the future we have a plan to experiment with different windows size such as two days, three days, etc. in order to analyze the influence of window size in our user behavior model. ● In our experiment, we compared the days between current days in same week, in the future we plan to compare the same day however in different week. 38