Skip to main content
Erschienen in: Soft Computing 12/2018

11.05.2017 | Methodologies and Application

A fuzzy decision support system for multifactor authentication

verfasst von: Arunava Roy, Dipankar Dasgupta

Erschienen in: Soft Computing | Ausgabe 12/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multifactor authentication (MFA) is a growing trend for the accurate identification of the legitimate users through different modalities such as biometrics, nonbiometric, and cognitive behavior metric. In this paper, we have developed an adaptive MFA that considers the effects of different user devices, media, environments, and the frequency of authentication to detect the legitimate user. For this purpose, initially, we have evaluated the trustworthiness values of all the authentication modalities in different user devices and media using a nonlinear programming problem with probabilistic constraints. Finally, an evolutionary strategy, using fuzzy “IF–THEN” rule and genetic algorithm has been developed for the adaptive selection of authentication modalities. We have done a numerical simulation to prove the effectiveness and efficiency of the proposed method. Moreover, we have developed a prototype client–server-based application and have done a detailed user study to justify its better usability than the existing counterparts.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Brennan et al. (2012), Dasgupta (1999), Dasgupta et al. (2016), Feng and Jain (2011), Guidorizzi (2003), Guntti and Picardi (2005), Jain et al. (2010, 1997), Kang et al. (2014), Locklear et al. (2014), Primo et al. (2014), Parziale and Chen (2009) and Serwadda et al. (2013).
 
2
Chatterjee and Roy (2014a, b), Roy (2015), Gomez et al. (2003a, b, c), González et al. (2003), Mamdani (1977), Ross (2010), Zimmermann (1996) and Tanaka (1996).
 
5
JSON: Java Script Object Notation.
 
Literatur
Zurück zum Zitat Abramson M, Aha DW (2013) User authentication from web browsing behavior. FLAIRS conference Abramson M, Aha DW (2013) User authentication from web browsing behavior. FLAIRS conference
Zurück zum Zitat Brennan M, Afroz S, Greenstadt R (2012) Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans Inf Syst Secur (TISSEC) 15(3):12–22CrossRef Brennan M, Afroz S, Greenstadt R (2012) Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans Inf Syst Secur (TISSEC) 15(3):12–22CrossRef
Zurück zum Zitat Chatterjee S, Roy A (2014b) Web software fault prediction under fuzzy environment using MODULO-M multivariate overlapping fuzzy clustering algorithm and newly proposed revised prediction algorithm. Appl Soft Comput 22:372–396CrossRef Chatterjee S, Roy A (2014b) Web software fault prediction under fuzzy environment using MODULO-M multivariate overlapping fuzzy clustering algorithm and newly proposed revised prediction algorithm. Appl Soft Comput 22:372–396CrossRef
Zurück zum Zitat Chatterjee S, Singh JB, Roy A (2015) A structure-based software reliability allocation using fuzzy analytic hierarchy process. Int J Syst Sci 46(3):513–525MathSciNetCrossRefMATH Chatterjee S, Singh JB, Roy A (2015) A structure-based software reliability allocation using fuzzy analytic hierarchy process. Int J Syst Sci 46(3):513–525MathSciNetCrossRefMATH
Zurück zum Zitat Dasgupta D, McGregor DR (1993) sGA: A structured genetic algorithm. Department of Computer Science, University of Strathclyde, Glasgow Dasgupta D, McGregor DR (1993) sGA: A structured genetic algorithm. Department of Computer Science, University of Strathclyde, Glasgow
Zurück zum Zitat Davis L (1991) Handbook of genetic algorithms. Van Nostrand Reinhold, New York Davis L (1991) Handbook of genetic algorithms. Van Nostrand Reinhold, New York
Zurück zum Zitat Deb K, Pratap A, Agarwal S, Meyarivan TAMT (2002) A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6:182–197CrossRef Deb K, Pratap A, Agarwal S, Meyarivan TAMT (2002) A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6:182–197CrossRef
Zurück zum Zitat Deutschmann I, Lindholm J (2013) Behavioral biometrics for DARPA’s active authentication program. International conference of the biometrics special interest group (BIOSIG). IEEE, pp 1–8 Deutschmann I, Lindholm J (2013) Behavioral biometrics for DARPA’s active authentication program. International conference of the biometrics special interest group (BIOSIG). IEEE, pp 1–8
Zurück zum Zitat Duc NM, Minh BQ (2009) Your face is NOT your password Face Authentication By—Passing Lenovo–Asus–Toshiba. Black Hat Briefings Duc NM, Minh BQ (2009) Your face is NOT your password Face Authentication By—Passing Lenovo–Asus–Toshiba. Black Hat Briefings
Zurück zum Zitat Feng J, Jain AK (2011) Fingerprint reconstruction: from minutiae to phase. IEEE Trans Pattern Anal Mach Intell 33(2):209–223CrossRef Feng J, Jain AK (2011) Fingerprint reconstruction: from minutiae to phase. IEEE Trans Pattern Anal Mach Intell 33(2):209–223CrossRef
Zurück zum Zitat Gomez J, Dasgupta D, Gonzalez F (2003a) Detecting cyber attackswith fuzzy data mining techniques. In: Proceedings of the third SIAMinternational conference on data mining, pp 1–4 Gomez J, Dasgupta D, Gonzalez F (2003a) Detecting cyber attackswith fuzzy data mining techniques. In: Proceedings of the third SIAMinternational conference on data mining, pp 1–4
Zurück zum Zitat Gomez J, Dasgupta D, Nasraoui O, Gonzalez F (2003b) Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection . In: Proceedings of the North American fuzzy information processing society (NAFIPS), pp 469–474 Gomez J, Dasgupta D, Nasraoui O, Gonzalez F (2003b) Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection . In: Proceedings of the North American fuzzy information processing society (NAFIPS), pp 469–474
Zurück zum Zitat Gomez J, Gonzalez F, Dasgupta D (2003c) An immune-fuzzy approach to anomaly detection. In: Proceedings of the twelfth IEEE international conference on fuzzy systems (FUZZIEEE), pp 1219–1224 Gomez J, Gonzalez F, Dasgupta D (2003c) An immune-fuzzy approach to anomaly detection. In: Proceedings of the twelfth IEEE international conference on fuzzy systems (FUZZIEEE), pp 1219–1224
Zurück zum Zitat González F, Gómez J, Kaniganti M, Dasgupta D (2003) An evolutionary approach to generate fuzzy anomaly signatures. In: Proceedings of the fourth annual ieee information assurance workshop. West Point, New York, pp 251–259 González F, Gómez J, Kaniganti M, Dasgupta D (2003) An evolutionary approach to generate fuzzy anomaly signatures. In: Proceedings of the fourth annual ieee information assurance workshop. West Point, New York, pp 251–259
Zurück zum Zitat Guidorizzi RP (2003) Security: active authentication. IT Prof 15:4–7CrossRef Guidorizzi RP (2003) Security: active authentication. IT Prof 15:4–7CrossRef
Zurück zum Zitat Guntti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur 8:312–347CrossRef Guntti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur 8:312–347CrossRef
Zurück zum Zitat Hwang S, Lee H, Cho S (2006) Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication. In: Chen H, Wang FY, Yang CC, Zeng D, Chau M, Chang K (eds) Intelligence and security informatics. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg, pp 73–78 Hwang S, Lee H, Cho S (2006) Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication. In: Chen H, Wang FY, Yang CC, Zeng D, Chau M, Chang K (eds) Intelligence and security informatics. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg, pp 73–78
Zurück zum Zitat Jain AK, Feng J, Nandakumar K (2010) Fingerprint matching. Computer 43:36–44CrossRef Jain AK, Feng J, Nandakumar K (2010) Fingerprint matching. Computer 43:36–44CrossRef
Zurück zum Zitat Jain AK, Hong L, Pankanti S, Bolle R (1997) An identity authentication system using fingerprints. Proc. IEEE 85(9):1365–1388CrossRef Jain AK, Hong L, Pankanti S, Bolle R (1997) An identity authentication system using fingerprints. Proc. IEEE 85(9):1365–1388CrossRef
Zurück zum Zitat Kang H, Slezak D (2010) Security technology. Disaster recovery and business continuity. Springer, Berlin Kang H, Slezak D (2010) Security technology. Disaster recovery and business continuity. Springer, Berlin
Zurück zum Zitat Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inf Sci 269:1–20MathSciNetCrossRef Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inf Sci 269:1–20MathSciNetCrossRef
Zurück zum Zitat Kaufmann A (1975) Introduction to the theory of fuzzy subsets. Academic Press, LondonMATH Kaufmann A (1975) Introduction to the theory of fuzzy subsets. Academic Press, LondonMATH
Zurück zum Zitat Lin IC, Chang CC (2009) A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Inf Sci 179:1269–1277MathSciNetCrossRefMATH Lin IC, Chang CC (2009) A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Inf Sci 179:1269–1277MathSciNetCrossRefMATH
Zurück zum Zitat Locklear H, Sitova Z, Govindarajan S, Goodkind A, Brizan DG, Gasti P (2014) Continuous authentication with cognition-centric text production and revision features. Presented at the international joint conference on biometrics (IJCB), Clearwater Locklear H, Sitova Z, Govindarajan S, Goodkind A, Brizan DG, Gasti P (2014) Continuous authentication with cognition-centric text production and revision features. Presented at the international joint conference on biometrics (IJCB), Clearwater
Zurück zum Zitat Lucas B, Kanade T (1981) An integrative image registration technique with an application in stereo vision. In: Proceedings of the 7th international joint conference on artificial intelligence, pp 674–679 Lucas B, Kanade T (1981) An integrative image registration technique with an application in stereo vision. In: Proceedings of the 7th international joint conference on artificial intelligence, pp 674–679
Zurück zum Zitat Luenberger DG, Ye Y (2008) Linear and nonlinear programming. Springer, StanfordMATH Luenberger DG, Ye Y (2008) Linear and nonlinear programming. Springer, StanfordMATH
Zurück zum Zitat Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput C–26:1182–1191CrossRefMATH Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput C–26:1182–1191CrossRefMATH
Zurück zum Zitat Melanie M (1999) An introduction to genetic algorithms. MIT Press, CambridgeMATH Melanie M (1999) An introduction to genetic algorithms. MIT Press, CambridgeMATH
Zurück zum Zitat Nag A, Roy A, Dasgupta D (2015) An adaptive approach towards the selection of multi-factor authentication. In: 2015 IEEE symposium series on computational intelligence, pp 463–472 Nag A, Roy A, Dasgupta D (2015) An adaptive approach towards the selection of multi-factor authentication. In: 2015 IEEE symposium series on computational intelligence, pp 463–472
Zurück zum Zitat Parziale G, Chen Y (2009) Advanced technologies for touchless fingerprint recognition. In: Tistarelli M, Li SZ, Chellappa R (eds) Handbook of Remote Biometrics, ser. Advances in Pattern Recognition, Springer, London, pp 83–109CrossRef Parziale G, Chen Y (2009) Advanced technologies for touchless fingerprint recognition. In: Tistarelli M, Li SZ, Chellappa R (eds) Handbook of Remote Biometrics, ser. Advances in Pattern Recognition, Springer, London, pp 83–109CrossRef
Zurück zum Zitat Patel VM, Yeh T, Fathy ME, Zhang Y, Chen Y, Chellappa R, Davis L (2013) Screen fingerprints: a novel modality for active authentication. IT Prof 15(4):38–42CrossRef Patel VM, Yeh T, Fathy ME, Zhang Y, Chen Y, Chellappa R, Davis L (2013) Screen fingerprints: a novel modality for active authentication. IT Prof 15(4):38–42CrossRef
Zurück zum Zitat Primo A, Phoha VV, Kumar R, Serwadda A (2014) Context-aware active authentication using smartphone accelerometer measurements. In: IEEE conference on computer vision and pattern recognition (CVPR) workshops Primo A, Phoha VV, Kumar R, Serwadda A (2014) Context-aware active authentication using smartphone accelerometer measurements. In: IEEE conference on computer vision and pattern recognition (CVPR) workshops
Zurück zum Zitat Razzaq A, Latif K, Ahmad HF, Hur A, Anwar Z, Bloodsworth PC (2014) Semantic security against web application attacks. Inf Sci 254:19–38CrossRef Razzaq A, Latif K, Ahmad HF, Hur A, Anwar Z, Bloodsworth PC (2014) Semantic security against web application attacks. Inf Sci 254:19–38CrossRef
Zurück zum Zitat Ross TJ (2010) Fuzzy logic and engineering applications. Wiley, New DelhiCrossRef Ross TJ (2010) Fuzzy logic and engineering applications. Wiley, New DelhiCrossRef
Zurück zum Zitat Roy A (2015) A novel multivariate fuzzy time series based forecasting algorithm incorporating the effect of clustering on prediction. Soft Comput. doi:10.1007/s00500-015-1619-3 Roy A (2015) A novel multivariate fuzzy time series based forecasting algorithm incorporating the effect of clustering on prediction. Soft Comput. doi:10.​1007/​s00500-015-1619-3
Zurück zum Zitat Serwadda A, Wang Z, Koch P, Govindarajan S, Pokala R, Goodkind A (2013) Scan-based evaluation of continuous keystroke authentication systems. IEEE IT Prof 15:20–23CrossRef Serwadda A, Wang Z, Koch P, Govindarajan S, Pokala R, Goodkind A (2013) Scan-based evaluation of continuous keystroke authentication systems. IEEE IT Prof 15:20–23CrossRef
Zurück zum Zitat Stewart JC, Monaco JV, Cha SH, Tappert CC (2011) An investigation of keystroke and Stylometry traits for authenticating online test takers. In: International joint conference on biometrics (IJCB). IEEE, pp 1–7 Stewart JC, Monaco JV, Cha SH, Tappert CC (2011) An investigation of keystroke and Stylometry traits for authenticating online test takers. In: International joint conference on biometrics (IJCB). IEEE, pp 1–7
Zurück zum Zitat Tanaka K (1996) An introduction to fuzzy logic for practical applications. Springer, BerlinMATH Tanaka K (1996) An introduction to fuzzy logic for practical applications. Springer, BerlinMATH
Zurück zum Zitat Tian Y, Kanade T, Cohn J (2000) Robust lip tracking by combining shape, color, and motion. In: Proceedings of ACCV’2000, pp 1040–1045 Tian Y, Kanade T, Cohn J (2000) Robust lip tracking by combining shape, color, and motion. In: Proceedings of ACCV’2000, pp 1040–1045
Zurück zum Zitat Tian YL, Kanade T, Cohn JF (2001)Recognizing facial actions by combining geometric features and regional appearance patterns. Robotics Institute, Carnegie Mellon University, Pittsburgh, PA 15213, CMU-RI-TR-01-01, CMU Tian YL, Kanade T, Cohn JF (2001)Recognizing facial actions by combining geometric features and regional appearance patterns. Robotics Institute, Carnegie Mellon University, Pittsburgh, PA 15213, CMU-RI-TR-01-01, CMU
Zurück zum Zitat Vielhauer C (2006) Biometric user authentication for IT security. Springer, Berlin Vielhauer C (2006) Biometric user authentication for IT security. Springer, Berlin
Zurück zum Zitat Zadeh LA (1975) The concept of linguistic variable and its application to approximate reasoning, parts 1–3. Inform Sci 8(3):199–249, 301–357, 9:43–80 Zadeh LA (1975) The concept of linguistic variable and its application to approximate reasoning, parts 1–3. Inform Sci 8(3):199–249, 301–357, 9:43–80
Zurück zum Zitat Zi J, Dasgupta D (2009) V-detector: an efficient negative selection algorithm with “probably adequate” detector coverage. Inf Sci 179:1390–1406CrossRef Zi J, Dasgupta D (2009) V-detector: an efficient negative selection algorithm with “probably adequate” detector coverage. Inf Sci 179:1390–1406CrossRef
Metadaten
Titel
A fuzzy decision support system for multifactor authentication
verfasst von
Arunava Roy
Dipankar Dasgupta
Publikationsdatum
11.05.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 12/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2607-6

Weitere Artikel der Ausgabe 12/2018

Soft Computing 12/2018 Zur Ausgabe