Abstract
Security through biometric keystroke and user action analysis on mobile phones is a new approach. Most of the existing solutions track only GPS location, which allows detecting theft. None of them support spy detection or short access of the intruder when the phone is away from its owner. In this paper, Authors present a solution that allows detecting intruder via analysis of typical user’s actions in the applications and way of writing - keystroke dynamics. Presented solutions can be run as an application on Android mobile devices and currently is distributed via Google Play Store alpha channel for testing by the limited number of users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
comScore.: https://www.comscore.com/. Last accessed 12 Dec 2019
AdMob serves a billion.: http://www.mobileent.biz. Last accessed 15 Dec 2019
Lysik, L., Machura, P.: The role and importance of mobile technology in everyday life of the 21st century (in Polish). http://www.mediaispoleczenstwo.ath.bielsko.pl/art/04_lysik_machura.pdf. Last accessed 30 Dec 2019
Kedziora, M., Gawin, P., Szczepanik, M., Jóźwiak, I.: Malware detection using machine learning algorithms and reverse engineering of Android Java Code. (2019). https://doi.org/10.5121/ijnsa.2019.11101
Szczepanik, M., Jóźwiak, I.: Fingerprint recognition based on minutes groups using directing attention algorithms. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds) Artificial Intelligence and Soft Computing. ICAISC 2012. Lecture Notes in Computer Science, vol. 7268. Springer, Berlin, Heidelberg (2012)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comp. Syst. 16, 351–359 (2000)
**, M., He, Y., Fang, D., Chen, X., Meng, X., **ng, T.: iGuard: A real-time anti-theft system for smartphones. In: IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, pp. 1-9 (2017). https://doi.org/10.1109/INFOCOM.2017.8057021
Prey Project.: https://preyproject.com/. Last accessed 18 Dec 2019
Cerberus.: https://www.cerberusapp.com/. Last accessed 18 Dec 2019
Szczepanik, M., Jóźwiak, I.J., Jamka, T., Stasiński, K.: Security lock system for mobile devices based on fingerprint recognition algorithm. In: Światek, J., Borzemski, L., Grzech, A., Wilimowska, Z. (eds) Proceedings of 36th International Conference on Information Systems Architecture and Technology—ISAT 2015—Part III. Advances in Intelligent Systems and Computing, vol. 431. Springer, Cham (2016)
Deng, Y., Zhong, Y.: Keystroke dynamics advances for mobile devices using deep neural network in Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 59–70 (2015)
Maiorana, E., Campisi, P., González-Carballo, N., Neri, A.: Keystroke dynamics authentication for mobile phones. In: Proceedings of the ACM Symposium on Applied Computing, vol. 21–26 (2011). https://doi.org/10.1145/1982185.1982190
Lee, H., Hwang, J.Y., Kim, D.I., Lee, S., Lee, S.H., Shin, J.S.: Understanding Keystroke Dynamics for Smartphone Users Authentication and Key-stroke Dynamics on Smartphones Built-In Motion Sensors. Secur. Commun. Netw. 2018(2567463), 10 (2018)
Alshanketi, F., Traoré, I., Awad, A.: Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords. Secur. Privacy 2, e48 (2019)
Shahzad, F.: Low-cost intruder detection and alert system using mobile phone proximity sensor. In: 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), pp. 1–5. Karachi (2017)
Jiang, C.H.: Keystroke statistical learning model for web authentication. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.314.1573&rep=rep1&type=pdf. Last accessed 30 Dec 2019
Shen, S., Lin, S., Kang, T., Chien, W.: Enhanced keystroke dynamics authentication utilizing pressure detection. In: 2016 International Conference on Applied System In-novation (ICASI), pp. 1–4. Okinawa (2016). https://doi.org/10.1109/ICASI.2016.7539947
Trojahn, M.: Biometric authentication through a virtual keyboard for smartphones. Int. J. Comput. Sci. Inf. Technol. 4, 1–12 (2012)
TensorFlow Lite.: https://www.tensorflow.org/lite. Last accessed 12 Dec 2019
Spydetector.: https://play.google.com/store/apps/details?id=com.apartapps.spydetector. Last accessed 30 Dec 2019 (restricted for alpha channel users)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Szczepanik, M., Jóźwiak, I. (2021). Intruder Detection on Mobile Phones Using Keystroke Dynamic and Application Usage Patterns. In: Korbicz, J., Patan, K., Luzar, M. (eds) Advances in Diagnostics of Processes and Systems. Studies in Systems, Decision and Control, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-030-58964-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-58964-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58963-9
Online ISBN: 978-3-030-58964-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)