A Look at Digital Transformation: Can Society Be Persuaded To a New Authentication Method – Behavioral Biometrics?
DOI:
https://doi.org/10.34630/bobcatsss.vi.4958Keywords:
Authentication, behavioral biometric, cybersecurity, machine learning, keystrokeAbstract
The 21st century brings many technological novelties and modifications to existing solutions. The digital transformation that we undergo in every aspect of life often affects us against our will, with varying results. Thousands of years ago, when a human rubbed two stones together, he caused a spark that started a chemical phenomenon, but above all - a revolution. Today, lighting a bonfire does not arouse great emotions, we are faced with many other technological novelties aimed at making our lives easier. In the past, when human didn’t need the fire, he had a choice. The present shows that we are becoming strongly dependent on technology and our choice becomes very limited or impossible. As a result, we agree to the terms offered. It is worth to investigate whether we take a bold decision overnight? What guides us in making such key decisions in our lives?
The main goal of this paper is to take a look at safeguards used to protect our goods, in information technology. Until now, the security measures used to authenticate the user were in the form of i.a. login and passwords, two-factor authentication (2FA), universal 2nd Factor (U2F), biometrics. Each of these solutions has its advantages and disadvantages. It would seem that these are the best solutions, and using them together would provide a multi-layer security. However, does it not become a significant obstacle in everyday use? Then behavioral biometrics comes to the rescue, which aims to learn our behaviour using machine learning and to clearly confirm in real time whether the person using the service or device is the owner. Using this method, many doubts and concerns arise about the technology itself. Based on the available research, literature and other sources, I will look for answers to the question „Can the public be persuaded to use this method of authentication?”. Justifying the reply, I will analyse the available tools and refer to the document of General Data Protection Regulation.
References
Acien, A., Monaco, J. V., Morales, A., Vera-Rodriguez, R., & Fierrez, J. (2020). TypeNet: Scaling up Keystroke Biometrics. In IAPR/IEEE International Joint Conference on Biometrics (IJCB). Retrieved from: https://arxiv.org/pdf/2004.03627.pdf
Ahmad, N., Szymkowiak, A., & Campbell, P. (2013). Keystroke dynamics in the pre-touchscreen era. Medicine Frontiers in Human Neuroscience. doi: 10.3389/fnhum.2013.00835
Ali, M. L., Monaco, J. V., & Tappert, C. C. et al. (2016). Keystroke Biometric Systems for User Authentication. J Sign Process Syst., 86, 175–190. doi: 10.1007/s11265-016-1114-9
Alzubaidi, A., & Kalita, J. (2016). Authentication of Smartphone Users Using Behavioral Biometrics. In IEEE Communications Surveys & Tutorials, vol. 18(3) (pp. 1998-2026). doi: 10.1109/COMST.2016.2537748
Amin, R., Gaber, T., ElTaweel, G., & Hassanien, A. E. (2014). Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. In A. Hassanien, T. H. Kim, J. Kacprzyk, & A. Awad (Eds.), Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, Vol. 70 (pp. 423-446). Berlin, Heidelberg: Springer. doi: 10.1007/978-3-662- 43616-5_16
Banerjee, S. P., & Woodard, D. (2012). Biometric Authentication and Identification Using Keystroke Dynamics: A Survey. Journal of Pattern Recognition Research, JPRR, 7 ( 1). doi: 10.13176/11.427
Behavioral Biometrics, International Biometrics Identity Association IBIA. Retrieved from: https://www.ibia.org/download/datasets/3839/Behavioral
Mohd Noorulfakhri Yaacob, Syed Zulkarnain Syed Idrus, Wan Nor Ashiqin Wan Ali, Wan Azani Mustafa, Mohd Aminudin Jamlos, & Mohd Helmy Abd Wahab. (2020). Decision Making Process in Keystroke Dynamics. Journal of Physics: Conference Series, Vol. 1529, The 2nd Joint International Conference on Emerging Computing Technology and Sports (JICETS). doi: 10.1088/1742-6596/1529/2/022087
Monaco, J. V. (2014). Classification and authentication of one-dimensional behavioral biometrics. In IEEE International Joint Conference on Biometrics, (IJCB). doi: 10.1109/BTAS.2014.6996253
Moskovitch, R. et al. (2009). Identity theft, computers and behavioral biometrics. In IEEE International Conference on Intelligence and Security Informatics (pp. 155-160). doi: 10.1109/ISI.2009.5137288
Padmavathi, G., & Shanmugapriya, D. (2009). A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges. International Journal of Computer Science and Information Security, IJCSIS, 5( 1), 115-119. Retrieved from: https://arxiv.org/abs/0910.0817
Patel, Y., Ouazzane, K., Vassilev, V. T., Faruqi, I., & Walker, G. L. (2019). Keystroke Dynamics using Auto Encoders. In International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1-8). Oxford, United Kingdom. doi: 10.1109/CyberSecPODS.2019.8885203
Pyka, A. (2019). Przetwarzanie danych osobowych do celów badań naukowych. Aspekty prawne. Studia Prawa Publicznego, 4 (28), 79-101. Retrieved from: https://doi.org/10.14746/spp.2019.4.28.4
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L 119, 4 May 2016 with later amendments. Retrieved from: https://eur- lex.europa.eu/eli/reg/2016/679/2016-05-04
Revett, K. (2008). Behavioral Biometrics: A Remote Access Approach. Chichester, United Kingdom: John Wiley & Sons, Ltd.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.