Behavioural Profiling Authentication Based on Trajectory Based Anomaly Detection Model of User’s Mobility

Piotr Kałużny

Abstract

Behavioural profiling and biometry are an interesting concept connected with authentication that have appeared in scientific literature and business world. Those methods indisputably offer new possibilities such as constant authentication and multi-user classification, but their taxonomy and definitions are not as clarified as it is for traditional authentication factors. The approach presented provides in this work provides an example of behavioural authentication model tested on a large dataset, focusing on one aspect of user behaviour - mobility, which can be adjusted to include other aspects in user behavioural authentication model. Also possible applications and extensions to the model are proposed.
Author Piotr Kałużny (WIiGE / KIE)
Piotr Kałużny,,
- Department of Information Systems
Pages242-254
Publication size in sheets0.6
Book Abramowicz Witold (eds.): Business Information Systems Workshops, Lecture Notes in Business Information Processing, vol. 303, 2017, Springer, ISBN 978-3-319-69022-3, [978-3-319-69023-0], 308 p., DOI:10.1007/978-3-319-69023-0
Keywords in EnglishBehavioural biometry, Behavioural profiling, User profile, Authentication, CDR, Mobility, Trajectory extraction, Stay-time, Anomaly detection
DOIDOI:10.1007/978-3-319-69023-0_21
Languageen angielski
Score (nominal)70
Score sourceconferenceList
ScoreMinisterial score = 70.0, 24-03-2020, ChapterFromConference
Publication indicators WoS Citations = 0
Citation count*3 (2020-09-14)
Cite
Share Share

Get link to the record


* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Back
Confirmation
Are you sure?