Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

by   Zachary Deridder, et al.

As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi factor authentication may only initially validate a user, which does not help if an impostor can bypass this initial validation. The field of touch dynamics emerges as a clear way to non intrusively collect data about a user and their behaviors in order to develop and make imperative security related decisions in real time. In this paper we present a novel dataset consisting of tracking 25 users playing two mobile games and Minecraft each for 10 minutes, along with their relevant gesture data. From this data, we ran machine learning binary classifiers namely Random Forest and K Nearest Neighbor to attempt to authenticate whether a sample of a particular users actions were genuine. Our strongest model returned an average accuracy of roughly 93 showing touch dynamics can differentiate users effectively and is a feasible consideration for authentication schemes. Our dataset can be observed at


page 1

page 2

page 3

page 4


Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Static authentication methods, like passwords, grow increasingly weak wi...

Common Evaluation Pitfalls in Touch-Based Authentication Systems

In this paper, we investigate common pitfalls affecting the evaluation o...

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

In recent years the amount of secure information being stored on mobile ...

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Implicit authentication (IA) is gaining popularity over recent years due...

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications

As nowadays most web application requests originate from mobile devices,...

Machine Learning Algorithms In User Authentication Schemes

In the past two decades, the number of mobile products being created by ...

WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch

In this paper, we show that the tap gesture, performed when a user 'taps...

Please sign up or login with your details

Forgot password? Click here to reset