Option of Control of Access to Information Resources Based on Implicit Authentication
https://doi.org/10.21869/2223-1560-2020-24-2-108-121
Abstract
Purpose of research is to build a model of a system for effective authentication of mobile users based on public data of the user and his behavioral factors as well as to study algorithms for calculating the threshold value at which the authentication of a mobile device user is considered successful.
Methods. When analyzing the behavioral factors of a user who needs to be authenticated when interacting with mobile devices, application of the following methods for calculating the threshold value are proposed: dynamic methods for determining the threshold value of user authentication based on the standard deviation and the calculation of the aggregate mean score; the method based on the standard when the system divides the aggregate flow of estimates into several blocks of the same length, where the first block is used for training, and the calculated threshold is used in the second block (this sequence of actions is repeated continuously, that is, the previous block provides training results for calculating the threshold for the current block); a method for calculating the aggregate mean score, where instead of using a single total score as input, the system uses the mean value of the current block, and the new calculated threshold is used as the threshold for decision making for the next block. A mathematical model that balances the speed and reliability of mobile users authentication is proposed.
Results. The result of the research is the development of an effective system for calculating the threshold value of successful authentication of a mobile device user based on behavioural features which adapts to changes of the user's behavioural factors. Experimental studies and comparisons with analogs confirming the completeness and correctness were carried out as well as various variants of the proposed solutions.
Conclusion. The proposed method of implicit authentication for mobile access control is easy to implement, easy to use, and adaptive to changes in input data. Options for calculating the threshold value at which implicit authentication is considered successful are also proposed.
About the Authors
A. L. MarukhlenkoRussian Federation
Anatoliy L. Marukhlenko - Cand. of Sci. (Engineering), Associate Professor of Information Security Department, Southwest State University.
50 Let Oktyabrya str. 94, Kursk 305040.
Competing Interests: The authors declare the absence of obvious and potential conflicts of interest related to the publication of this article.
A. V. Plugatarev
Russian Federation
Aleksey V. Plugatarev - Master Student of Information Security Department, Southwest State University.
50 Let Oktyabrya str. 94, Kursk 305040.
Competing Interests: The authors declare the absence of obvious and potential conflicts of interest related to the publication of this article.
M. O. Tanygin
Russian Federation
Maksim O. Tanygin - Cand. of Sci. (Engineering), Head of Information Security Department, Southwest State University.
50 Let Oktyabrya str. 94, Kursk 305040.
Competing Interests: The authors declare the absence of obvious and potential conflicts of interest related to the publication of this article.
L. O. Marukhlenko
Russian Federation
Leonid O. Marukhlenko - Senior Lecturer of Information Security Department, Southwest State University.
50 Let Oktyabrya str. 94, Kursk 305040.
Competing Interests: The authors declare the absence of obvious and potential conflicts of interest related to the publication of this article.
M. Yu. Shashkov
Russian Federation
Maksim Yu. Shashkov - Master Student of Information Security Department, Southwest State University.
50 Let Oktyabrya str. 94, Kursk 305040.
Competing Interests: The authors declare the absence of obvious and potential conflicts of interest related to the publication of this article.
References
1. Gupta A., Miettinen M., Asokan N., Nagy M. Intuitive security policy configuration in mobile devices using context profiling. In Privacy, Security, Risk and Trust (PASSAT), 2012 International.
2. Kayacik H. G., Just M., Baillie L., Aspinall D., Micallef N. Data driven authentication: On the effectiveness of user behavior modeling with mobile device sensors. In Proceedings of the Third Workshop on Mobile Security Technologies (MoST), 2014.
3. Tamviruzzaman M., Ahamed S. I., Hasan C. S., O'brien C. ePet: when cellular phone learns to recognize its owner. In Proceedings of the 2nd ACM workshop.
4. Marukhlenko A.L., Marukhlenko L.O., Konoreva E.E., Tanygin M.O. [Analysis of potential vulnerabilities and modern methods of protecting multi-user resources]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti resheniya. Sbornik nauchnykh statei po materialam II Vserossiiskoi nauchno-prakticheskoi konferentsii [Infocommunications and space technologies: state, problems and solutions The collection of scientific articles based on the materials of the II All-Russian scientific-practical conference]. Kursk, 2018, pp. 136-140 (In Russ.).
5. Marukhlenko A.L., Seleznev K.D., Tanygin M.O., Marukhlenko L.O. Organizatsiya sistemy setevogo monitoringa i otsenki sostoyaniya informatsionnoi bezopasnosti ob"ekta [Arrangement of the System of Network Monitoring and Assessment of the State of Information Security of an Object]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta = Proceedings of the Southwest State University, 2019, vol. 23, no. 1, pp. 118-129 (In Russ.) http://doi.org/10.21869/2223-1560-2019-23-1-118-129.
6. Riva O., Qin C., Strauss K., Lymberopoulos D. Progressive Authentication: Deciding When to Authenticate on Mobile Phones. In USENIX Security Symposium, 2012, pp. 301-316.
7. Marukhlenko A.L., Plugatarev A.V., Marukhlenko L.O., Efremov M.A. Kompleksna-ya otsenka informatsionnoi bezopasnosti ob"ekta s primeneniem matematicheskoi modeli dlya rascheta pokazatelei riska [A comprehensive assessment of the information security of an object using a mathematical model for calculating risk indicators]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering, 2018, vol. 8, no. 4 (29), pp. 34-40 (In Russ.).
8. Hayashi E., Das S., Amini S., Hong J., Oakley I. Casa: context-aware scalable authentication." In Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM, 2013, pp. 3-13.
9. Marukhlenko A.L., Mirzakhanov P.S., Marukhlenko S.L. Monitoring i imitatsionnoe modelirovanie protsessov vzaimodeistviya abonentov vychis-litel'noi seti [Monitoring and simulation modeling of processes of interaction between subscribers of a computer network]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering, 2012. no. 2-3, pp. 236-241 (In Russ.).
10. Tanygin M.O., Alshaya Kh.Ya., Altukhova V.A., Marukhlenko A.L. Ustanovlenie doveritel'nogo kanala obmena dannymi mezhdu istochnikom i priemnikom informatsii s pomoshch'yu modifitsirovannogo metoda odnorazovykh parolei [Establishing a confidence channel for exchanging data between a source and a receiver of information using the modified one-time password method]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering, 2018, vol. 8, no. 4 (29), pp. 63-71 (In Russ.).
11. Marukhlenko A.L., Marukhlenko L.O., Plugatarev A.V., Dobritsa V.P. [A software module for assessing the cryptographic strength of symmetric encryption methods using parallel computing]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti resheniya sbornik nauchnykh statei po materialam II Vserossiiskoi nauchno-prakticheskoi konferentsii [Infocommunications and space technologies: state, problems and solutions. The collection of scientific articles based on the materials of the II All-Russian Scientific and Practical Conference]. Kursk, 2018, pp. 33-38 (In Russ.).
12. Tanygin M.O., Berliseva V.A., Alshaya Kh.Ya.A. [Reversible conversion algorithm to control packet authenticity in networks with low bandwidth]. INFOkommunikatsii i kos-micheskie tekhnologii: sostoyanie, problemy i puti resheniya sbornik nauchnykh statei po materialam III Vserossiiskoi nauchno-prakticheskoi konferentsii [INFO communications and space technologies: state, problems and solutions. The collection of scientific articles based on the materials of the III All-Russian scientific-practical conference]. Kursk, 2019, pp. 169173 (In Russ.).
13. Marukhlenko A.L., Zarubina N.K., Shamina A.A., Marukhlenko I.I. [A variant of organizing a secure version control system and software updates for compiling distributions]. Infokommunikatsii i kosmicheskie tekhnologii: sostoyanie, problemy i puti resheniya. Materialy 1 Vserossiiskoi nauchno-prakticheskoi konferentsii. [Infocommunications and space technologies: state, problems and ways of solving. Materials of the 1st All-Russian Scientific and Practical Conference]. Kursk, 2017, pp. 190-196 (In Russ.).
14. Blerton Abazi, Besnik Qehaja, Edmond Hajrizi. Application of biometric models of authentication in mobile equipment. IFAC-PapersOnLineVolume 52, is. 252019, pp. 543-546.
15. Marukhlenko A.L., Mirzakhanov P.S. Programmnyi kompleks dlya modelirovaniya protsessa peredachi i obrabotki setevykh potokov dannykh [A software package for modeling the process of transmitting and processing network data streams]. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta. Seriya: Upravlenie, vychislitel'naya tekhnika, informatika. Meditsinskoe priborostroenie = Proceedings of the Southwest State University. Series: Control, Computing Engineering, Information Science. Medical Instruments Engineering, 2012, no. 2-3, pp. 175-180 (In Russ.).
16. Efremova E.O., Kalugin E.V. [Adaptive message source authentication algorithm]. Prikladnaya matematika i informatika: sovremennye issledovaniya v oblasti estestvennykh i tekhnicheskikh nauk. Materialy V Mezhdunarodnoi nauchno-prakticheskoi konferentsii (shkoly-seminara) molodykh uchenykh. [Applied mathematics and computer science: modern research in the field of natural and technical sciences. Materials of the V International scientific-practical conference (school-seminar) of young scientists]. Tolyatti, 2019, pp. 38-42 (In Russ.).
17. Dobritsa V.P., Milykh V.A., Lapina T.I., Lapin D.V. Sposob dinamicheskoi biometricheskoi autentifikatsii lichnosti po osobennostyam pocherka [The method of dynamic biometric authentication of personality according to the features of handwriting]. Patent RF, 2541131 C2, 02/10/2015. Application No. 2013128214/08 of 06/19/2013 (In Russ.).
18. Bobyntsev D.O., Lisitsin L.A., Marukhlenko A.L., Kuzheleva S.A. Administrirovanie informatsionnykh sistem [Administration of information systems]. Kursk, 2019, 201 p. (In Russ.).
19. Marukhlenko A.L., Tanygin M.O., Efremov M.A., Spevakov A.G. Bezopasnost' informatsionnykh sistem [Security of information systems]. Kursk, 2019, 210 p. (In Russ.).
20. Efremov M.A., Khalin Yu.A., Marukhlenko A.L., Marukhlenko L.O. Razrabotka zashchishchennykh korporativnykh sistem na baze klient-servernoi tekhnologii [Development of secure corporate systems based on client-server technology]. Kursk, 2018, 176 p. (In Russ.).
Review
For citations:
Marukhlenko A.L., Plugatarev A.V., Tanygin M.O., Marukhlenko L.O., Shashkov M.Yu. Option of Control of Access to Information Resources Based on Implicit Authentication. Proceedings of the Southwest State University. 2020;24(2):108-121. (In Russ.) https://doi.org/10.21869/2223-1560-2020-24-2-108-121