Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User’s Mobility
AbstractBehavioural profiling and biometry are an interesting concept connected with authentication that have appeared in scientific literature and business world. Those methods indisputably offer new possibilities such as constant authentication and multi-user classification, but their taxonomy and definitions are not as clarified as it is for traditional authentication factors. The approach presented provides in this work provides an example of behavioural authentication model tested on a large dataset, focusing on one aspect of user behaviour - mobility, which can be adjusted to include other aspects in user behavioural authentication model. Also possible applications and extensions to the model are proposed.
|Publication size in sheets||0.6|
|Book||Abramowicz Witold (eds.): Business Information Systems Workshops, Lecture Notes in Business Information Processing, vol. 303, 2017, Springer, ISBN 978-3-319-69022-3, [978-3-319-69023-0], 308 p., DOI:10.1007/978-3-319-69023-0|
|Keywords in English||Behavioural biometry, Behavioural profiling, User profile, Authentication, CDR, Mobility, Trajectory extraction, Stay-time, Anomaly detection|
|Score||= 70.0, 24-03-2020, ChapterFromConference|
|Publication indicators||= 0|
|Citation count*||3 (2020-09-14)|
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.