Web-Based Behavioral Modeling for Continuous User Authentication (CUA)

Advances in Computers - Tập 105 - Trang 1-44 - 2017
L.C. Leonard1
1U.S. Army Engineer Research and Development Center, Vicksburg, MS, United States

Tài liệu tham khảo

Guidorizzi, 2013, Security: active authentication, IT Professional, 15, 4, 10.1109/MITP.2013.73 SplashData. Splashdata news, 2015 (Online; accessed 03 October 2015). Koichiro Niinuma, 2010, Continuous user authentication using temporal information, Proc. SPIE 7667, Biometric Technology for Human Identification VII, 76670L, 10.1117/12.847886 Patcha, 2007, An overview of anomaly detection techniques: existing solutions and latest technological trends, Comput. Netw., 51, 3448, 10.1016/j.comnet.2007.02.001 Niinuma, 2010, Soft biometric traits for continuous user authentication, IEEE Trans. Inf. Forensics Secur., 5, 771, 10.1109/TIFS.2010.2075927 DARPA. Active authentication. http://www.darpa.mil/program/active authentication, 2013 (Online; accessed 24 November 2015). Shen, 2012, Continuous authentication for mouse dynamics: a pattern-growth approach, 1 Monrose, 2000, Keystroke dynamics as a biometric for authentication, Future Gener. Comput. Syst., 16, 351, 10.1016/S0167-739X(99)00059-X Information System. Information system, 2015 (Online; accessed 03 October 2015). Milton, 2014, N-gram based user behavioral model for continuous user authentication Jurafsky, 2009 Yubico. Yubico. http://www.yubico.com/, 2013 (Online; accessed 1 November 2013). Schweitzer, 2011, Visualizing keyboard pattern passwords, Inf. Vis., 10, 127, 10.1057/ivs.2010.12 Klosterman, 2000 Kaminsky, 2003, Decentralized user authentication in a global file system, 60 Chow, 2010, Authentication in the clouds: a framework and its application to mobile users, 1 The Wall Street Journal. U.S. suspects hackers in china breached about 4 million people's records, officials say. http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888, 2015 (Online; accessed 17 November 2015). Grosse, 2013, Authentication at scale, IEEE Secur. Priv., 11, 15, 10.1109/MSP.2012.162 Deutschmann, 2013, Continuous authentication using behavioral biometrics, IT Professional, 15, 12, 10.1109/MITP.2013.50 Jagadeesan, 2012, Continuous authentication in computers, vol. 1, 40 Altinok, 2003, Temporal integration for continuous multimodal biometrics, 131 Kang, 2006, Multi-modal feature integration for secure authentication, 1191 Xie, 2012, Innocent by association: early recognition of legitimate users, 353 Wu, 2013, SenSec: mobile security through passive sensing, 1128 Saevanee, 2015, Continuous user authentication using multi-modal biometrics, Comput. Secur., 53, 234, 10.1016/j.cose.2015.06.001 Kiah Chia, 2010, Statistical lattice-based spoken document retrieval, ACM Trans. Inf. Syst., 28 Ponte, 1998, A language modeling approach to information retrieval, 275 Xiong, 2011, Enhancing language models in statistical machine translation with backward n-grams and mutual information triggers, vol. 1, 1288 Collins, 2005, Discriminative syntactic language modeling for speech recognition, 507 Rosenfeld, 2000, Two decades of statistical language modeling: where do we go from here, 2000 Egmont-Petersen, 2002, Image processing with neural networks—a review, Pattern Recogn., 35, 2279, 10.1016/S0031-3203(01)00178-9 Fadlalla, 2001, An analysis of the applications of neural networks in finance, Interfaces, 31, 112, 10.1287/inte.31.4.112.9662 Ruano, 2013, On the use of artificial neural networks for biomedical applications, vol. 195, 433, 10.1007/978-3-642-33941-7_40 Larochelle, 2009, Exploring strategies for training deep neural networks, J. Mach. Learn. Res., 10, 1 Akerkar, 2009 Mikolov, 2011, Strategies for training large scale neural network language models, 196 Berger, 1996, A maximum entropy approach to natural language processing, Comput. Linguist., 22, 39 Rosenfeld, 1996, A maximum entropy approach to adaptive statistical language modeling, Comput. Speech Lang., 10, 187, 10.1006/csla.1996.0011 Bahl, 1990, Readings in speech recognition, 507 Chandola, 2009, Anomaly detection: a survey, ACM Comput. Surv., 41, 15:1, 10.1145/1541880.1541882 Breslow, 1997, Simplifying decision trees: a survey, Knowl. Eng. Rev., 12, 1, 10.1017/S0269888997000015 Petrovskiy, 2008, A data mining approach to learning probabilistic user behavior models from database access log, 323, 10.1007/978-3-540-70621-2_26 Shannon, 2001, A mathematical theory of communication, SIGMOBILE Mob. Comput. Commun. Rev., 5, 3, 10.1145/584091.584093 Deshpande, 2004, Selective markov models for predicting web page accesses, ACM Trans. Internet Technol., 4, 163, 10.1145/990301.990304 Manavoglu, 2003, Probabilistic user behavior models, 203 Baum, 1966, Statistical inference for probabilistic functions of finite state markov chains, Ann. Math. Statist., 37, 1554, 10.1214/aoms/1177699147 Baum, 1967, An inequality with applications to statistical estimation for probabilistic functions of markov processes and to a model for ecology, Bull. Amer. Math. Soc., 73, 360, 10.1090/S0002-9904-1967-11751-8 Baum, 1970, Maximization technique occurring in the statistical analysis of probabilistic functions of markov chains, Ann. Math. Stat., 41, 360 Rabiner, 1989, A tutorial on hidden markov models and selected applications in speech recognition, Proc. IEEE, 77, 257, 10.1109/5.18626 Razmerita, 2011, An ontology-based framework for modeling user behavior—a case study in knowledge management, IEEE Trans. Syst. Man Cybern. Part A Syst. Hum., IEEE Transactions on, 41, 772, 10.1109/TSMCA.2011.2132712 CAC. Dod common access card. http://www.cac.mill/, 2015 (Online; accessed 11 September 2015). Wertsch, 1998 Burke, 1966 Lin, 2009, Modeling actions of pubmed users with n-gram language models, Inf. Retr., 12, 487, 10.1007/s10791-008-9067-7 Cooley, 1999, Data preparation for mining world wide web browsing patterns, Knowl. Inf. Syst., 1, 5, 10.1007/BF03325089 Liu, 2006, A novel and quick svm-based multi-class classifier, Pattern Recogn., 39, 2258, 10.1016/j.patcog.2006.05.034 Honeine, 2013, Multiclass classification machines with the complexity of a single binary classifier, Signal Process., 93, 1013, 10.1016/j.sigpro.2012.11.009 Pauls, 2011, Faster and smaller n-gram language models, vol. 1, 258 Introduction to Continuous Authentication, 2013, 1 Bungum, 2012, Efficient n-gram language modeling for billion word web corpora Federico, 2008, IRSTLM: an open source toolkit for handling large scale language models, 10.21437/Interspeech.2008-271