Digital Repository

Behavior & Biometrics Based Masquerade Detection Mobile Application

Show simple item record

dc.contributor.author Chandrasekara, P.
dc.contributor.author Rajapaksha, S.
dc.contributor.author Abeywardana, H.
dc.contributor.author Sanjeevan, P.
dc.contributor.author Abeywardena, K. Y.
dc.date.accessioned 2019-08-07T09:28:36Z
dc.date.available 2019-08-07T09:28:36Z
dc.date.issued 2019
dc.identifier.citation Chandrasekara, P., Rajapaksha, S., Abeywardana, H., Sanjeevan, P. and Abeywardena, K. Y. (2019). Behavior & Biometrics Based Masquerade Detection Mobile Application. 4th International Conference on Advances in Computing and Technology (ICACT ‒ 2019), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka. p7. en_US
dc.identifier.uri http://repository.kln.ac.lk/handle/123456789/20327
dc.description.abstract Mobile phone has become an important asset when it comes to personal security since one’s mobile is now a virtual safe for that person. This is due to the sensitivity of the details which are stored in these devices. To protect the information inside a mobile phone the manufacturers use conventional technologies such as password protection, face recognition or finger print protection. Nevertheless, it is clear that these security methods can be bypassed by several other techniques as shoulder surfing, finger print or face recognition by pass with 3D printing. Due to these concerns post authentication is an increasingly discussed topic in the security domain. However, there are very few applied researches done on the post authentication of mobile platforms. In order to protect the phone from an unauthorized user a novel method is proposed by the authors. The aim of the research is to detect the illegitimate user by monitoring the behavior of the user. In order to detect the behavior four main parameters are proposed. Namely, Key stroke dynamics using a customized keyboard, location detection, voice recognition and App usage. Initially machine learning is used to train this mobile application with the authentic user’s behavior and they are stored in a central database. After the initial training period the application is monitoring the usage comparing it with the existing data of the legitimate user. Another unique feature is the inbuilt prevention mechanism which is designed to be executed when an illegitimate user is detected. The entire storage content will be encrypted and a current location alert along with a captured photo of the intruder will be sent to a pre-defined account of the real user in a cloud platform. The real user can log into the account remotely and obtain the phone’s location and the photo of the intruder. Furthermore, this application is proposed as an inbuilt application in order to avoid the deletion of app or uninstallation of the app by the intruder. With this proposed post authentication application “AuthDNA”, a user is able to protect sensitive information of the mobile device in case of theft and bypassing of initial authentication. en_US
dc.language.iso en en_US
dc.publisher 4th International Conference on Advances in Computing and Technology (ICACT ‒ 2019), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka en_US
dc.subject Machine Learning en_US
dc.subject Authentication en_US
dc.subject Encryption en_US
dc.subject Voice recognition en_US
dc.subject Cloud Storage en_US
dc.title Behavior & Biometrics Based Masquerade Detection Mobile Application en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account