Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User’s Mobility

Piotr Kałużny


Behavioural profiling and biometry are an interesting concept connected with authentication that have appeared in scientific literature and business world. Those methods indisputably offer new possibilities such as constant authentication and multi-user classification, but their taxonomy and definitions are not as clarified as it is for traditional authentication factors. The approach presented provides in this work provides an example of behavioural authentication model tested on a large dataset, focusing on one aspect of user behaviour - mobility, which can be adjusted to include other aspects in user behavioural authentication model. Also possible applications and extensions to the model are proposed.
Author Piotr Kałużny (WIiGE / KIE)
Piotr Kałużny,,
- Department of Information Systems
Publication size in sheets0.6
Book Abramowicz Witold (eds.): Business Information Systems Workshops, Lecture Notes in Business Information Processing, vol. 303, 2017, Springer, ISBN 978-3-319-69022-3, [978-3-319-69023-0], 308 p., DOI:10.1007/978-3-319-69023-0
Keywords in EnglishBehavioural biometry, Behavioural profiling, User profile, Authentication, CDR, Mobility, Trajectory extraction, Stay-time, Anomaly detection
Languageen angielski
Score (nominal)70
Score sourceconferenceList
ScoreMinisterial score = 70.0, 24-03-2020, ChapterFromConference
Publication indicators WoS Citations = 0
Citation count*3 (2020-09-14)
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?