Abstract
Cybersecurity companies from around the world use state-of-the-art technology to provide the best protection against malicious software. Recent times have seen behavioral biometry becoming one of the most popular and widely used components in MFA (Multi-Factor Authentication). The effectiveness and lack of impact on UX (User Experience) is making its popularity rapidly increase among branches in the area of confidential data handling, such as banking, insurance companies, the government, or the military. Although behavioral biometric methods show a high degree of protection against fraudsters, they are susceptible to the quality of input data. The selected behavioral biometrics are strongly dependent on mobile phone IMU sensors. This paper investigates the harmful effects of gaps in data on the behavioral biometry model’s accuracy in order to propose suitable countermeasures for this issue.
Funder
Development and verification of new methods of user authentication based on behavioral biometrics and machine learning methods
European Regional Development Fund
Statutory Research for Young Researchers funds
Faculty of Automatic Control, Electronics and Computer Science, Silesian University of Technology, Gliwice, Poland
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference31 articles.
1. (2022, November 01). Internet Crime Report. Internet Crime Complaint Center (IC3), Available online: https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf.
2. Human Factors in Phishing Attacks: A Systematic Literature Review;Desolda;ACM Comput. Surv.,2022
3. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy;Alkhalil;Front. Comput. Sci.,2021
4. Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?;Shahbaznezhad;J. Comput. Inf. Syst.,2021
5. Aneke, J., Ardito, C., and Desolda, G. (2021, January 22–24). Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks. Proceedings of the International Conference on Human-Computer Interaction, Málaga, Spain.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献