4 CONCLUSIONS
This study presented a novel behavioural profiling
approach to verifying the user in terms of mobile
application security and providing robust user
identification. In this study, three supervised machine
learning algorithms were selected to evaluate the
proposed approach and to determine the ideal
classifier based on EER value. The experimental
results show that the significance of this research lies
in having successfully applied continuous user
verification for mobile applications in a manner that
fulfils both security and usability requirements.
Although the authentication decision is based on
action resolution, the experimental results are still
promising. Making an authentication decision on
each user action might lead to an unusable system
which does not present transparent authentication.
For future work, solutions could be suggested and
tested to improve the usability of the approach in
relation to the security requirements. For instance, it
would be beneficial to test the impact of different time
windows on performing the verification process and
how this affects the overall accuracy of the model.
REFERENCES
Alotaibi, S., Furnell, S. and Clarke, N. (2015). “Transparent
authentication systems for mobile device security: A
review”. In the 10th International Conference for
Internet Technology and Secured Transactions
(ICITST) (pp. 406-413). IEEE.
Alotaibi, S., Furnell, S., and Clarke, N. (2016). “A novel
Taxonomy for mobile applications data”. Int. J. Cyber-
Security Digit. Forensics, 5 (3), 115-121.
Alotaibi, S., Furnell, S., and Clarke, N. (2016a).” MORI:
An Innovative Mobile Applications Data Risk
Assessment Model”. In Journal of Internet Technology
and Secured Transactions (JITST), Volume 5, Issues
3/4.
Clarke, N., Karatzouni, S., and Furnell, S. (2009). “Flexible
and transparent user authentication for mobile devices”.
IFIP Advances in Information and Communication
Technology, 297/2009, pp.1-12.
Clarke, N. (2011).”Transparent user authentication:
biometrics, RFID and behavioural profiling”. Springer
Science and Business Media.
Fridman, L., Weber, S., Greenstadt, R. and Kam, M.
(2015). “Active authentication on mobile devices via
stylometry, application usage, web browsing, and GPS
Location”. In arXiv preprint arXiv, pp.1–10.
Eagle, N., and Pentland, A. (2006). Reality mining: sensing
complex social systems. Personal and ubiquitous
computing, 10(4), 255-268.
Hatin, J., Cherrier, E., Schwartzmann, J., and Rosenberger,
C. (2017).”Privacy preserving transparent mobile
authentication”. In International Conference on
Information Systems Security and Privacy (ICISSP).
pp. 354-361.
Hooker, S., Erhan, D., Kindermans, P. J., and Kim, B.
(2018). “Evaluating Feature Importance Estimates”.
ArXiv preprint arXiv: 1806.10758.
Li, F., Clarke, N., Papadaki, M., and Dowland, P. (2011).
“Misuse detection for mobile devices using behaviour
profiling”. IJCWT, vol. 1, no. 1, pp.41– 53.
Li, F., Clarke, N., Papadaki, M., and Dowland, P., (2014).
“Active authentication for mobile devices utilising
behaviour profiling”. International journal of
information security, 13(3), pp.229-244.
Mahfouz, A., Mahmoud, T. M., and Eldin, A. S. (2017). “A
survey on behavioral biometric authentication on
smartphones”. Journal of Information Security and
Applications, 37, 28-37.
Meng, W., Wong, D., Furnell, S., and Zhou, J. (2015).”
Surveying the development of biometric user
authentication on mobile phones”. IEEE
Communications Surveys and Tutorials (Volume: 17,
Issue: 3). pp. 1268 – 1293.
Narudin, F. A., Feizollah, A., Anuar, N. B., and Gani, A.
(2016). “Evaluation of machine learning classifiers for
mobile malware detection”. Soft Computing, 20(1),
343-357.
Neal, T. J., and Woodard, D. L. (2017). “Using associative
classification to authenticate mobile device users”. In
Biometrics (IJCB), 2017 IEEE International Joint
Conference on (pp. 71-79). IEEE.
Saevanee, H., Clarke, N., and Furnell, S. (2012). “Multi-
modal behavioural biometric authentication for mobile
devices”. In Proceedings of the Information Security
and Privacy Research, IFIP Advances in Information
and Communication Technology - IFIP AICT. Springer
Boston. pp. 465-474.
Saevanee, H., Clarke, N., Furnell, S., and Biscione, V.
(2014). “Text-based active authentication for mobile
devices”. In ICT Systems Security and Privacy
Protection. Berlin Heidelberg: Springer, pp.99-112.
Shi E, Niu Y, Jakobsson M, and Chow R. (2011). “Implicit
authentication through learning user behavior”. In:
Proceedings of the 13th international conference on
information security. ISC’10. Berlin, Heidelberg:
Springer-Verlag. p. 99–113. ISBN 978-3-642-18177-1.
Zhang, J., Tan, X., Wang, X., Yan, A., and Qin, Z. (2018).
“T2FA: Transparent Two-Factor Authentication”. In
IEEE Access, 6, pp.32677-32686. DOI:
10.1109/ACCESS.2018.2844548
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications
251