Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

July 27, 2022 ยท Entered Twilight ยท ๐Ÿ› 2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI)

๐Ÿ’ค TWILIGHT: Eternal Rest
Repo abandoned since publication

Repo contents: MC_data, Snake and MC Results.xlsx, Snake_data, classifier_results_raw

Authors Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala arXiv ID 2207.13648 Category cs.HC: Human-Computer Interaction Cross-listed cs.CR Citations 12 Venue 2022 9th International Conference on Soft Computing & Machine Intelligence (ISCMI) Repository https://github.com/zderidder/MC-Snake-Results โญ 2 Last Checked 1 month ago
Abstract
As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi factor authentication may only initially validate a user, which does not help if an impostor can bypass this initial validation. The field of touch dynamics emerges as a clear way to non intrusively collect data about a user and their behaviors in order to develop and make imperative security related decisions in real time. In this paper we present a novel dataset consisting of tracking 25 users playing two mobile games Snake.io and Minecraft each for 10 minutes, along with their relevant gesture data. From this data, we ran machine learning binary classifiers namely Random Forest and K Nearest Neighbor to attempt to authenticate whether a sample of a particular users actions were genuine. Our strongest model returned an average accuracy of roughly 93% for both games, showing touch dynamics can differentiate users effectively and is a feasible consideration for authentication schemes. Our dataset can be observed at https://github.com/zderidder/MC-Snake-Results
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Human-Computer Interaction