A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking

Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms. Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices. Machine-learning-based frameworks are effective for active authentication. However, the su...

Full description

Bibliographic Details
Main Authors: Abdulaziz Alzubaidi, Swarup Roy, Jugal Kalita
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2019-11-01
Series:Digital Communications and Networks
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864817301815
id doaj-66da59927ae0441d88422d30292fc274
record_format Article
spelling doaj-66da59927ae0441d88422d30292fc2742021-02-02T04:18:36ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482019-11-0154205213A data reduction scheme for active authentication of legitimate smartphone owner using informative apps rankingAbdulaziz Alzubaidi0Swarup Roy1Jugal Kalita2Department of Computer Science, Umm Alqura University, Al-Qunfudah, 28821, Saudi Arabia; Corresponding author.Department of Computer Applications, Sikkim University, Gangtok, 737102, India; Department of Information Technology, North Eastern Hill University, Shillong, 793022, India; Corresponding author.Department of Computer Science, University of Colorado, Colorado Springs, CO, 80918, USASmartphones are vulnerable to fraudulent use despite having strong authentication mechanisms. Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices. Machine-learning-based frameworks are effective for active authentication. However, the success of any machine-learning-based techniques depends highly on the relevancy of the data in hand for training. In addition, the training time should be very efficient. Keeping in view both issues, we’ve explored a novel fraudulent user detection method based solely on the app usage patterns of legitimate users. We hypothesized that every user has a unique pattern hidden in his/her usage of apps. Motivated by this observation, we’ve designed a way to obtain training data, which can be used by any machine learning model for effective authentication. To achieve better accuracy with reduced training time, we removed data instances related to any specific user from the training samples which did not contain any apps from the user-specific priority list. An information theoretic app ranking scheme was used to prepare a user-targeted apps priority list. Predictability of each instance related to a candidate app was calculated by using a knockout approach. Finally, a weighted rank was calculated for each app specific to every user. Instances with low ranked apps were removed to derive the reduced training set. Two datasets as well as seven classifiers for experimentation revealed that our reduced training data significantly lowered the prediction error rates in the context of classifying the legitimate user of a smartphone. Keywords: Fraudulent user, Machine learning, Classification, Behavioral biometric, Smartphone securityhttp://www.sciencedirect.com/science/article/pii/S2352864817301815
collection DOAJ
language English
format Article
sources DOAJ
author Abdulaziz Alzubaidi
Swarup Roy
Jugal Kalita
spellingShingle Abdulaziz Alzubaidi
Swarup Roy
Jugal Kalita
A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
Digital Communications and Networks
author_facet Abdulaziz Alzubaidi
Swarup Roy
Jugal Kalita
author_sort Abdulaziz Alzubaidi
title A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
title_short A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
title_full A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
title_fullStr A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
title_full_unstemmed A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
title_sort data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
publisher KeAi Communications Co., Ltd.
series Digital Communications and Networks
issn 2352-8648
publishDate 2019-11-01
description Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms. Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices. Machine-learning-based frameworks are effective for active authentication. However, the success of any machine-learning-based techniques depends highly on the relevancy of the data in hand for training. In addition, the training time should be very efficient. Keeping in view both issues, we’ve explored a novel fraudulent user detection method based solely on the app usage patterns of legitimate users. We hypothesized that every user has a unique pattern hidden in his/her usage of apps. Motivated by this observation, we’ve designed a way to obtain training data, which can be used by any machine learning model for effective authentication. To achieve better accuracy with reduced training time, we removed data instances related to any specific user from the training samples which did not contain any apps from the user-specific priority list. An information theoretic app ranking scheme was used to prepare a user-targeted apps priority list. Predictability of each instance related to a candidate app was calculated by using a knockout approach. Finally, a weighted rank was calculated for each app specific to every user. Instances with low ranked apps were removed to derive the reduced training set. Two datasets as well as seven classifiers for experimentation revealed that our reduced training data significantly lowered the prediction error rates in the context of classifying the legitimate user of a smartphone. Keywords: Fraudulent user, Machine learning, Classification, Behavioral biometric, Smartphone security
url http://www.sciencedirect.com/science/article/pii/S2352864817301815
work_keys_str_mv AT abdulazizalzubaidi adatareductionschemeforactiveauthenticationoflegitimatesmartphoneownerusinginformativeappsranking
AT swaruproy adatareductionschemeforactiveauthenticationoflegitimatesmartphoneownerusinginformativeappsranking
AT jugalkalita adatareductionschemeforactiveauthenticationoflegitimatesmartphoneownerusinginformativeappsranking
AT abdulazizalzubaidi datareductionschemeforactiveauthenticationoflegitimatesmartphoneownerusinginformativeappsranking
AT swaruproy datareductionschemeforactiveauthenticationoflegitimatesmartphoneownerusinginformativeappsranking
AT jugalkalita datareductionschemeforactiveauthenticationoflegitimatesmartphoneownerusinginformativeappsranking
_version_ 1724305959244791808