Skip to main content

2019 | OriginalPaper | Buchkapitel

8. Continuous Authentication Using Writing Style

verfasst von : Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang

Erschienen in: Biometric-Based Physical and Cybersecurity Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The reinforcement of traditional static authentication by performing continuous authentication (CA) while the system is being used ensures that the user is legitimate throughout the computer usage. Stylometry can be a good candidate for CA since writing style can be acquired in a nonintrusive way and also is a good indicator of authorship. In using stylometry, the authentication process consists of comparing sample writing of an individual against the model or profile associated with the identity claimed by that individual at login time (i.e., one-to-one identity matching). Effective CA requires reauthenticating the user over a short period of time, which equates using a short text. Analyzing short texts is challenging since decision-making occurs on a limited amount of available information. High accuracy and resilience to forgery are other key challenges faced by CA. In this chapter, we discuss the key research challenges faced in using stylometry for CA, and we introduce an approach to tackle some of those challenges. Different classification techniques are investigated and evaluated using different public datasets, yielding encouraging performance results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A.A.E. Ahmed, I. Traore, Dynamic sample size detection in continuous authentication using sequential sampling, in Proceedings of the 27th Annual Computer Security Applications Conference, New York, NY, USA, (2011) A.A.E. Ahmed, I. Traore, Dynamic sample size detection in continuous authentication using sequential sampling, in Proceedings of the 27th Annual Computer Security Applications Conference, New York, NY, USA, (2011)
2.
Zurück zum Zitat M.E. Crosby, C.S. Ikehara, Continuous identity authentication using multimodal physiological sensors 5404 (2004), pp. 393–400 M.E. Crosby, C.S. Ikehara, Continuous identity authentication using multimodal physiological sensors 5404 (2004), pp. 393–400
3.
Zurück zum Zitat I. Traore, A. A. E. Ahmed (eds.), Continuous authentication using biometrics: continuous authentication using biometrics: data, models, and metrics (IGI Global, 2012), p. 385 I. Traore, A. A. E. Ahmed (eds.), Continuous authentication using biometrics: continuous authentication using biometrics: data, models, and metrics (IGI Global, 2012), p. 385
4.
Zurück zum Zitat R.S. Gaines, W. Lisowski, S.J. Press, N. Shapiro, Authentication by keystroke timing: some preliminary results. No. RAND-R-2526-NSF. Rand Corp Santa Monica CA, (1980) R.S. Gaines, W. Lisowski, S.J. Press, N. Shapiro, Authentication by keystroke timing: some preliminary results. No. RAND-R-2526-NSF. Rand Corp Santa Monica CA, (1980)
5.
Zurück zum Zitat A.A.E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE Trans. Depend. Sec. Comput. 4, 165–179 (2007)CrossRef A.A.E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE Trans. Depend. Sec. Comput. 4, 165–179 (2007)CrossRef
6.
Zurück zum Zitat M. Koppel J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the 21st International Conference on Machine Learning, Banff, (2004) M. Koppel J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the 21st International Conference on Machine Learning, Banff, (2004)
7.
Zurück zum Zitat L. Ballard, F. Monrose, D. Lopresti, Biometric authentication revisited: understanding the impact of wolves in sheepś clothing, in Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, (2006) L. Ballard, F. Monrose, D. Lopresti, Biometric authentication revisited: understanding the impact of wolves in sheepś clothing, in Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, (2006)
8.
Zurück zum Zitat T.C. Mendenhall, The characteristic curves of composition. Science ns-9, 237–246 (1887)CrossRef T.C. Mendenhall, The characteristic curves of composition. Science ns-9, 237–246 (1887)CrossRef
9.
Zurück zum Zitat F. Mosteller, D.L. Wallace. Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers. Journal of the American Statistical Association 58(302), 275–309 (1963)MATH F. Mosteller, D.L. Wallace. Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers. Journal of the American Statistical Association 58(302), 275–309 (1963)MATH
10.
Zurück zum Zitat A. Abbasi, H. Chen, Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67–75 (2005)CrossRef A. Abbasi, H. Chen, Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67–75 (2005)CrossRef
11.
Zurück zum Zitat F. Iqbal, R. Hadjidj, B.C.M. Fung, M. Debbabi, A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5, S42–S51 (2008)CrossRef F. Iqbal, R. Hadjidj, B.C.M. Fung, M. Debbabi, A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5, S42–S51 (2008)CrossRef
12.
Zurück zum Zitat F. Iqbal, L.A. Khan, B.C.M. Fung, M. Debbabi, E-mail authorship verification for forensic investigation, in Proceedings of the 2010 ACM Symposium on Applied Computing, New York, NY, USA, (2010) F. Iqbal, L.A. Khan, B.C.M. Fung, M. Debbabi, E-mail authorship verification for forensic investigation, in Proceedings of the 2010 ACM Symposium on Applied Computing, New York, NY, USA, (2010)
13.
Zurück zum Zitat F. Iqbal, H. Binsalleeh, B.C.M. Fung, M. Debbabi, A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231, 98–112 (2013)CrossRef F. Iqbal, H. Binsalleeh, B.C.M. Fung, M. Debbabi, A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231, 98–112 (2013)CrossRef
14.
Zurück zum Zitat C.E. Chaski, Who's at the keyboard: authorship attribution in digital evidence investigations. Int. J. Digit. Evid. 4, 1–13 (2005) C.E. Chaski, Who's at the keyboard: authorship attribution in digital evidence investigations. Int. J. Digit. Evid. 4, 1–13 (2005)
15.
Zurück zum Zitat J. Burrows, Delta: a measure of stylistic difference and a guide to likely authorship. Lit. Ling. Comput. 17, 267–287 (2002)CrossRef J. Burrows, Delta: a measure of stylistic difference and a guide to likely authorship. Lit. Ling. Comput. 17, 267–287 (2002)CrossRef
16.
Zurück zum Zitat E. Backer, P. van Kranenburg, On musical stylometry pattern recognition approach. Pattern Recogn. Lett. 26, 299–309 (2005)CrossRef E. Backer, P. van Kranenburg, On musical stylometry pattern recognition approach. Pattern Recogn. Lett. 26, 299–309 (2005)CrossRef
17.
Zurück zum Zitat Y. Zhao, J. Zobel, Searching with style: authorship attribution in classic literature, in Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, Darlinghurst, (2007) Y. Zhao, J. Zobel, Searching with style: authorship attribution in classic literature, in Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, Darlinghurst, (2007)
18.
Zurück zum Zitat R.A.G.K. Sarawgi, Y. Choi, Gender attribution: tracing stylometric evidence beyond topic and genre, in Proceedings of the 15th Conference on Computational Natural Language Learning, Stroudsburg, (2011) R.A.G.K. Sarawgi, Y. Choi, Gender attribution: tracing stylometric evidence beyond topic and genre, in Proceedings of the 15th Conference on Computational Natural Language Learning, Stroudsburg, (2011)
19.
Zurück zum Zitat N. Cheng, X. Chen, R. Chandramouli, K.P. Subbalakshmi, Gender identification from e-mails, in Computational Intelligence and Data Mining, 2009. CIDM '09. IEEE Symposium on, (2009) N. Cheng, X. Chen, R. Chandramouli, K.P. Subbalakshmi, Gender identification from e-mails, in Computational Intelligence and Data Mining, 2009. CIDM '09. IEEE Symposium on, (2009)
20.
Zurück zum Zitat N. Cheng, R. Chandramouli, K.P. Subbalakshmi, Author gender identification from text. Digit. Investig. 8, 78–88 (2011)CrossRef N. Cheng, R. Chandramouli, K.P. Subbalakshmi, Author gender identification from text. Digit. Investig. 8, 78–88 (2011)CrossRef
21.
Zurück zum Zitat P. Juola, R.H. Baayen, A controlled-corpus experiment in authorship identification by cross-entropy. Lit. Ling. Comput. 20, 59–67 (2005)CrossRef P. Juola, R.H. Baayen, A controlled-corpus experiment in authorship identification by cross-entropy. Lit. Ling. Comput. 20, 59–67 (2005)CrossRef
22.
Zurück zum Zitat O. Canales, V. Monaco, T. Murphy, E. Zych, J. Stewart, C.T.A. Castro, O. Sotoye, L. Torres, G. Truley, A stylometry system for authenticating students taking online tests, (2011) O. Canales, V. Monaco, T. Murphy, E. Zych, J. Stewart, C.T.A. Castro, O. Sotoye, L. Torres, G. Truley, A stylometry system for authenticating students taking online tests, (2011)
23.
Zurück zum Zitat X. Chen, P. Hao, R. Chandramouli, K.P. Subbalakshmi, Authorship similarity detection from email messages, in Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, Berlin, (2011) X. Chen, P. Hao, R. Chandramouli, K.P. Subbalakshmi, Authorship similarity detection from email messages, in Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, Berlin, (2011)
24.
Zurück zum Zitat P. Juola, E. Stamatatos, Overview of the author identification task at PAN 2013, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013) P. Juola, E. Stamatatos, Overview of the author identification task at PAN 2013, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013)
25.
Zurück zum Zitat S. Seidman, Authorship verification using the impostors method, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013) S. Seidman, Authorship verification using the impostors method, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013)
26.
Zurück zum Zitat M. L. Brocardo, I. Traore, S. Saad and I. Woungang, Authorship verification for short messages using stylometry, in Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2013 M. L. Brocardo, I. Traore, S. Saad and I. Woungang, Authorship verification for short messages using stylometry, in Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2013
27.
Zurück zum Zitat M.L. Brocardo, I. Traore, I.Woungang, M.S. Obaidat, Authorship verification using deep belief network systems. Int. J. Commun. Syst. e3259–n/a 2017 M.L. Brocardo, I. Traore, I.Woungang, M.S. Obaidat, Authorship verification using deep belief network systems. Int. J. Commun. Syst. e3259–n/a 2017
28.
Zurück zum Zitat B. Kjell, W.A. Woods, O. Frieder, Discrimination of authorship using visualization. Inf. Process. Manag. 30, 141–150 (1994)CrossRef B. Kjell, W.A. Woods, O. Frieder, Discrimination of authorship using visualization. Inf. Process. Manag. 30, 141–150 (1994)CrossRef
29.
Zurück zum Zitat S.M. Alzahrani, N. Salim, A. Abraham, Understanding plagiarism linguistic patterns, textual features, and detection methods, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 42, 133–149, (2012)CrossRef S.M. Alzahrani, N. Salim, A. Abraham, Understanding plagiarism linguistic patterns, textual features, and detection methods, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 42, 133–149, (2012)CrossRef
30.
Zurück zum Zitat E. Stamatatos, A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538–556 (2009)CrossRef E. Stamatatos, A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538–556 (2009)CrossRef
31.
Zurück zum Zitat J.F. Burrows, Word patterns and story shapes: the statistical analysis of narrative style. Lit. Ling. Comput. 2, 61–70 (1987)CrossRef J.F. Burrows, Word patterns and story shapes: the statistical analysis of narrative style. Lit. Ling. Comput. 2, 61–70 (1987)CrossRef
32.
Zurück zum Zitat D.I. Holmes, The evolution of stylometry in humanities scholarship. Lit. Ling. Comput 13, 111–117 (1998)CrossRef D.I. Holmes, The evolution of stylometry in humanities scholarship. Lit. Ling. Comput 13, 111–117 (1998)CrossRef
33.
Zurück zum Zitat N. Homem, J.P. Carvalho, Authorship identification and author fuzzy Fingerprints, in Fuzzy Information Processing Society (NAFIPS), 2011 Annual Meeting of the North American, (2011) N. Homem, J.P. Carvalho, Authorship identification and author fuzzy Fingerprints, in Fuzzy Information Processing Society (NAFIPS), 2011 Annual Meeting of the North American, (2011)
34.
Zurück zum Zitat F.J. Tweedie, R.H. Baayen, How variable may a constant be? Measures of lexical richness in perspective. Comput. Hum. 32, 323–352 (1998)CrossRef F.J. Tweedie, R.H. Baayen, How variable may a constant be? Measures of lexical richness in perspective. Comput. Hum. 32, 323–352 (1998)CrossRef
35.
Zurück zum Zitat O.D. Vel, A. Anderson, M. Corney, G. Mohay, Mining e-mail content for author identification forensics. Sigmod Record 30, 55–64 (2001)CrossRef O.D. Vel, A. Anderson, M. Corney, G. Mohay, Mining e-mail content for author identification forensics. Sigmod Record 30, 55–64 (2001)CrossRef
36.
Zurück zum Zitat R. Zheng, J. Li, H. Chen, Z. Huang, A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 57(3), 378–393 (February 2006)CrossRef R. Zheng, J. Li, H. Chen, Z. Huang, A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 57(3), 378–393 (February 2006)CrossRef
37.
Zurück zum Zitat A. Orebaugh, J. Allnutt, Classification of instant messaging communications for forensics analysis. Int. J. Forensic Comput. Sci. 1, 22–28 (2009)CrossRef A. Orebaugh, J. Allnutt, Classification of instant messaging communications for forensics analysis. Int. J. Forensic Comput. Sci. 1, 22–28 (2009)CrossRef
38.
Zurück zum Zitat M. Koppel, J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the twenty-first international conference on Machine learning, (2004) M. Koppel, J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the twenty-first international conference on Machine learning, (2004)
39.
Zurück zum Zitat F. Peng, D. Schuurmans, S. Wang, V. Keselj, Language independent authorship attribution using character level language models, in Proceedings of the 10th Conference on European. Chapter of the Association for Computational Linguistics - Volume 1, Stroudsburg, (2003) F. Peng, D. Schuurmans, S. Wang, V. Keselj, Language independent authorship attribution using character level language models, in Proceedings of the 10th Conference on European. Chapter of the Association for Computational Linguistics - Volume 1, Stroudsburg, (2003)
40.
Zurück zum Zitat P. Juola, Authorship attribution for electronic documents, in Advances in digital forensics II, vol. 222, (Springer, New York, 2006), pp. 119–130CrossRef P. Juola, Authorship attribution for electronic documents, in Advances in digital forensics II, vol. 222, (Springer, New York, 2006), pp. 119–130CrossRef
41.
Zurück zum Zitat H.V. Halteren, Author verification by linguistic profiling: an exploration of the parameter space. ACM Trans. Speech Lang. Process 4(1), 1–17 (February 2007)CrossRef H.V. Halteren, Author verification by linguistic profiling: an exploration of the parameter space. ACM Trans. Speech Lang. Process 4(1), 1–17 (February 2007)CrossRef
42.
Zurück zum Zitat M.R. Brennan, R. Greenstadt, Practical attacks against authorship recognition techniques, in IAAI, (2009) M.R. Brennan, R. Greenstadt, Practical attacks against authorship recognition techniques, in IAAI, (2009)
43.
Zurück zum Zitat M.L. Brocardo, I. Traore, I. Woungang, Toward a framework for continuous authentication using stylometry, in The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, (2014) M.L. Brocardo, I. Traore, I. Woungang, Toward a framework for continuous authentication using stylometry, in The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, (2014)
44.
Zurück zum Zitat H. Baayen, H. van Halteren, F. Tweedie, Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Lit. Ling. Comput. 11, 121–132 (1996)CrossRef H. Baayen, H. van Halteren, F. Tweedie, Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Lit. Ling. Comput. 11, 121–132 (1996)CrossRef
45.
Zurück zum Zitat M. Koppel, J. Schler, Exploiting Stylistic Idiosyncrasies for Authorship Attribution, in IJCAI'03 Workshop on Computational Approaches to Style Analysis and Synthesis, Acapulco, (2003) M. Koppel, J. Schler, Exploiting Stylistic Idiosyncrasies for Authorship Attribution, in IJCAI'03 Workshop on Computational Approaches to Style Analysis and Synthesis, Acapulco, (2003)
46.
Zurück zum Zitat S. Argamon, S. Marin, S.S. Stein, Style mining of electronic messages for multiple authorship discrimination: first results, in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, (2003) S. Argamon, S. Marin, S.S. Stein, Style mining of electronic messages for multiple authorship discrimination: first results, in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, (2003)
47.
Zurück zum Zitat R. Hadjidj, M. Debbabi, H. Lounis, F. Iqbal, A. Szporer, D. Benredjem, Towards an integrated e-mail forensic analysis framework. Digit. Investig. 5, 124–137 (2009)CrossRef R. Hadjidj, M. Debbabi, H. Lounis, F. Iqbal, A. Szporer, D. Benredjem, Towards an integrated e-mail forensic analysis framework. Digit. Investig. 5, 124–137 (2009)CrossRef
48.
Zurück zum Zitat A. Abbasi, H. Chen, Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 1–29 (April 2008)CrossRef A. Abbasi, H. Chen, Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 1–29 (April 2008)CrossRef
49.
Zurück zum Zitat M.L. Brocardo, I. Traore, Continuous authentication using micro-,essages, in Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, 2014 M.L. Brocardo, I. Traore, Continuous authentication using micro-,essages, in Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, 2014
50.
Zurück zum Zitat B. Klimt, Y. Yang, The enron corpus: a new dataset for email classification research, in Machine learning: ECML 2004, (Springer, 2004), pp. 217–226 B. Klimt, Y. Yang, The enron corpus: a new dataset for email classification research, in Machine learning: ECML 2004, (Springer, 2004), pp. 217–226
51.
Zurück zum Zitat W.-W. Deng, H. Peng, Research on a Naive Bayesian Based short message filtering system, in Machine Learning and Cybernetics, 2006 International Conference on, (2006) W.-W. Deng, H. Peng, Research on a Naive Bayesian Based short message filtering system, in Machine Learning and Cybernetics, 2006 International Conference on, (2006)
52.
Zurück zum Zitat J. Cai, Y. Tang, R. Hu, Spam filter for short messages using winnow, in Advanced Language Processing and Web Information Technology, 2008. ALPIT'08. International Conference on, (2008) J. Cai, Y. Tang, R. Hu, Spam filter for short messages using winnow, in Advanced Language Processing and Web Information Technology, 2008. ALPIT'08. International Conference on, (2008)
53.
Zurück zum Zitat M. Koppel, J. Schler, S. Argamon, Authorship attribution in the wild. Lang. Resour. Eval. 45(1), 83–94 (March 2010)CrossRef M. Koppel, J. Schler, S. Argamon, Authorship attribution in the wild. Lang. Resour. Eval. 45(1), 83–94 (March 2010)CrossRef
Metadaten
Titel
Continuous Authentication Using Writing Style
verfasst von
Marcelo Luiz Brocardo
Issa Traore
Isaac Woungang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-98734-7_8

Neuer Inhalt