genuine attempts to enter the system were successful
(FRR=0).
The results of this simple system reveal that the
idea of using a 3D authentication system is feasible
with a False Acceptance Rate of 0.1167 (1-0.8833).
This value is calculated at a zero value for False
Rejection Rate.
It seems that the data recorded in one session was
more related to each other than the data recorded in
the other session. Therefore, the data should be
gathered at different times, as might be expected in a
practical system.
6 RECOMMENDATIONS FOR
FUTURE WORK
Behavioural authentication has the potential to be
introduced as a powerful authentication tool where
variables can be extracted easily. However extensive
research is needed to improve it. This section
provides several recommendations to improve the
system that was studied in this paper.
One of the drawbacks of the system implemented
in this project was the small amount of data
available for the analysis. Gathering more data from
the user behaviour in the 3D environment could
improve the results. Several ways to increase the
amount of data are:
1. Adding more directions (up and down) in y
axis. An example could be adding floors to the
environment.
2. Increasing the test time. This may decrease the
level of system acceptability among users.
Although, ideally, these behavioural metrics
should be extracted without the user’s
knowledge.
3. Defining additional levels of behavioural
analysis.
4. Using keystroke dynamics analysis similar to
one was used in (Bergadano, Gunetti, &
Picardi, 2002).
Another suggestion is to improve the analytical
methods of data analysis. As was shown in the
results section, the analysis method has a great effect
on the results achieved.
7 CONCLUSIONS
The aim of this study was to investigate the
feasibility of having an authentication system based
on user's behaviour. A 3D authentication system was
implemented for the feasibility study. The results of
conducting the tests show an average True Rejection
Rate of 88.33% with an average False Acceptance
Rate of 11.67%. These rates are not perfect but it
shows the possibility of implementing this system.
The findings show that although more studies are
needed, the concept of having a 3D authentication
system is feasible.
ACKNOWLEDGEMENTS
We would like to express our gratitude to the
University of Portsmouth and the Iraqi Ministry of
Communication for allowing this research to be
undertaken.
REFERENCES
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User
authentication through keystroke dynamics. ACM
Trans. Inf. Syst. Secur. , 5 (4), 367-397.
Buthan, I., & Hartel, P. (2005). The state of the art in
abuse of biometrics. Technical Report, Centre for
Telematics and Information Technology, Enschede.
Gamboa, H., & Fred, A. (2004). A Behavioural Biometric
System Based on Human Computer Interaction. Proc.
SPIE - Int. Soc. Opt. Eng. (pp. 381-92). Orlando,
USA: SPIE-Int. Soc. Opt. Eng.
Jin, Z., Teoh, A. B., Thian, S. O., & Tee, C. (2008).
Typing dynamics biometric authentication through
fuzzy logic. Proc. - Int. Symp. Inf. Technol., ITSim
(pp. 1 - 6). Kuala Lumpur, Malaysia: IEEE.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001).
Enhancing security and privacy in biometrics-based
authentication systems. IBM Systems Journal , 40 (3),
614-34.
Yampolskiy, R. (2008). Behavioral modeling: an
overview. American Journal of Applied Sciences , 5
(5), 496--503.
Yampolskiy, R., & Govindaraju, V. (2009). Strategy-
based behavioural biometrics: a novel approach to
automated identification. International Journal of
Computer Applications in Technology , 35 (1), 29-41.
GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
89