AI-Based Identity Verification Through Behavioral Biometrics: Enhancing Remote Work Security

Authors

DOI:

https://doi.org/10.59994/ajbtme.2024.2.33

Abstract

With the increased adaptability of remote work patterns, secure and efficient identity verification has also become a paramount concern. The traditional model of authentication involving the use of passwords or security tokens fails to provide any continuous verification of the user and is also prone to hacking attempts. Behavioral biometrics, especially keystroke dynamics and mouse movement patterns, offer an effective alternative as they allow for unobtrusive user authentication that is based on the individual user's behavior and is therefore continuous. This paper explores the application of Long Short-Term Memory (LSTM) networks, a sequence-based AI model, for studying and differentiating behavioral biometrics. We are using freely available data sets of keystroke and mouse dynamics to design and test an LSTM based system which is capable of making a distinction between users and imposters. We have shown that LSTM networks are significantly better in handling time series data such as state transition sequences than other statistical machinery traditional machine learning methods, such as Random Forests and Support Vector Machines, where they scored 89% accuracy between normal user operations and abuse activity. This aspect of the research addresses the reason why LSTM networks are appropriate for live remote identity verification systems, which is their ability to learn long strips of sequences and the behavioral flow. The originality of the study is to expand secure authentication solutions based on artificial intelligence systems that can be integrated to facilitate remote working in any sector for enhanced security.

Keywords:

Remote Work Security, Behavioral Biometrics, Identity Verification, Long Short-Term Memory (LSTM) Networks, Artificial Intelligence (AI)

References

A Privacy-Preserving System Design for Digital Presence Protection. (2023). Computers, Materials and Continua, 75(2), 3091–3110. https://doi.org/10.32604/cmc.2023.032826

Bajaj, S., & Kaur, S. (2013). Typing Speed Analysis of Human for Password Protection (Based On Keystrokes Dynamics). https://www.semanticscholar.org/paper/Typing-Speed-Analysis-of-Human-for-Password-(Based-Bajaj-Kaur/b4ee2baeb2c9a58332199850a7c1f795f29c7fde

Banerjee, S. P., & Woodard, D. (2012). Biometric Authentication and Identification Using Keystroke Dynamics: A Survey. Journal of Pattern Recognition Research, 7(1), 116–139. https://doi.org/10.13176/11.427

Botero Arcila, B. (2024). AI liability in Europe: How does it complement risk regulation and deal with the problem of human oversight? Computer Law & Security Review, 54, 106012. https://doi.org/10.1016/j.clsr.2024.106012

Deeplearningbook. (n.d.). Retrieved November 19, 2024, from https://www.deeplearningbook.org/contents/mlp.html

Espín López, J. M., Huertas Celdrán, A., Esquembre, F., Martínez Pérez, G., & Marín-Blázquez, J. G. (2023). CGAPP: A continuous group authentication privacy-preserving platform for industrial scene. Journal of Information Security and Applications, 78, 103622. https://doi.org/10.1016/j.jisa.2023.103622

Fereidooni, H., König, J., Rieger, P., Chilese, M., Gökbakan, B., Finke, M., Dmitrienko, A., & Sadeghi, A.-R. (2023). AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms (No. arXiv:2302.02740). arXiv. https://doi.org/10.48550/arXiv.2302.02740

Hochreiter, S., & Schmidhuber, J. (1997). Long Short-Term Memory. Neural Computation, 9(8), 1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735

Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804

Keras: Deep Learning for humans. (n.d.). Retrieved November 19, 2024, from https://keras.io/

Keystroke Dynamics—Benchmark Data Set. (n.d.). Retrieved November 19, 2024, from https://www.kaggle.com/datasets/carnegiecylab/keystroke-dynamics-benchmark-data-set

Kuric, E., Demcak, P., Krajcovic, M., & Nemcek, P. (2024). Is mouse dynamics information credible for user behavior research? An empirical investigation. Computer Standards & Interfaces, 90, 103849. https://doi.org/10.1016/j.csi.2024.103849

Mouse dynamics. (n.d.). Retrieved December 22, 2024, from https://kaggle.com/code/jaafarnejm/mouse-dynamics

Parate, S., Josyula, H. P., & Reddi, L. T. (2023). Digital identity verification: transforming KYC processes in banking through advanced technology and enhanced security measures. International Research Journal of Modernization in Engineering Technology and Science, 5(9), 128-137.‏

Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images. (2023). CMES - Computer Modeling in Engineering and Sciences, 139(1), 725–739. https://doi.org/10.32604/cmes.2023.030640

Saraswat, D., Bhattacharya, P., Shah, T., Satani, R., & Tanwar, S. (2023). Anti-spoofing-enabled Contactless Attendance Monitoring System in the COVID-19 Pandemic. Procedia Computer Science, 218, 1506–1515. https://doi.org/10.1016/j.procs.2023.01.129

StandardScaler. (n.d.). Scikit-Learn. Retrieved November 19, 2024, from https://scikit-learn/stable/modules/generated/sklearn.preprocessing.StandardScaler.html

Stragapede, G., Vera-Rodriguez, R., Tolosana, R., Morales, A., Acien, A., & Lan, G. L. (2022). Mobile Behavioral Biometrics for Passive Authentication (No. arXiv:2203.07300). arXiv. https://doi.org/10.48550/arXiv.2203.07300

Yu, Y., Si, X., Hu, C., & Zhang, J. (2019). A Review of Recurrent Neural Networks: LSTM Cells and Network Architectures. Neural Computation, 31(7), 1235–1270. https://doi.org/10.1162/neco_a_01199

Downloads

Published

2024-12-15

How to Cite

Awawdeh, M., Salem, A., Qaraqe, A., & Abu-Mariah, H. . (2024). AI-Based Identity Verification Through Behavioral Biometrics: Enhancing Remote Work Security. Ahliya Journal of Business Technology and MEAN Economies, 1(2), 33–42. https://doi.org/10.59994/ajbtme.2024.2.33

Issue

Section

Articles