TY - GEN
T1 - Identity theft, computers and behavioral biometrics
AU - Moskovitch, Robert
AU - Feher, Clint
AU - Messerman, Arik
AU - Kirschnick, Niklas
AU - Mustafić, Tarik
AU - Camtepe, Ahmet
AU - Löhlein, Bernhard
AU - Heister, Ulrich
AU - Möller, Sebastian
AU - Rokach, Lior
AU - Elovici, Yuval
PY - 2009/10/22
Y1 - 2009/10/22
N2 - The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
AB - The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
UR - http://www.scopus.com/inward/record.url?scp=70350051000&partnerID=8YFLogxK
U2 - 10.1109/ISI.2009.5137288
DO - 10.1109/ISI.2009.5137288
M3 - Conference contribution
AN - SCOPUS:70350051000
SN - 9781424441730
T3 - 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009
SP - 155
EP - 160
BT - 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009
T2 - 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009
Y2 - 8 June 2009 through 11 June 2009
ER -