2021
DOI: 10.3390/electronics10141622
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics

Abstract: Continuous authentication (CA) is the process to verify the user’s identity regularly without their active participation. CA is becoming increasingly important in the mobile environment in which traditional one-time authentication methods are susceptible to attacks, and devices can be subject to loss or theft. The existing literature reports CA approaches using various input data from typing events, sensors, gestures, or other user interactions. However, there is significant diversity in the methodology and sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…By plotting recall on the y-axis and precision on the x-axis, the recall-precision curve is usually utilized for different threshold values used in classification choices [23][24]. Every point on the curve was associated with a certain threshold.…”
Section: Continuous Authenticationmentioning
confidence: 99%
“…By plotting recall on the y-axis and precision on the x-axis, the recall-precision curve is usually utilized for different threshold values used in classification choices [23][24]. Every point on the curve was associated with a certain threshold.…”
Section: Continuous Authenticationmentioning
confidence: 99%
“…As both surveys were published in 2013, newer approaches are not included. Newer publications either propose an approach (e. g., (Kim et al, 2020)) or concentrate on specific issues, including a comparison of different models (Singh et al, 2020), machine learning classifiers (de Marcos et al, 2021), and emotion recognition (Maalej and Kallel, 2020). In addition, Shekhawat and Bhatt (Shekhawat and Bhatt, 2019) analyze the ERR in multiple use cases and different classification algorithms without converting the validation parameters for comparison.…”
Section: Related Workmentioning
confidence: 99%
“…Some research provides lightweight mechanisms to support encryption and authentication for real-world scenarios. In order to better realize the integration and development of continuous authentication (CA) [28] in mobile devices, M. Frank et al [29] implement and compare different ML agent models for CA in mobile environments. Experiments show that among the mentioned ML classifiers, ensemble methods (RFC, ETC, and GBC) perform the best, while SVM performs the worst among all classifiers.…”
Section: Encrypted Communication Technology and Mechanismmentioning
confidence: 99%