Core Concepts
Behavioral authentication is crucial for security and safety, encompassing identity, conformity, and benignity levels.
Abstract
The article discusses the importance of behavioral appropriateness in system security and safety.
It introduces three levels of behavioral authentication: Identity, Conformity, and Benignity.
Various methods like keystroke-based, touch gesture-based, motion-based, intrinsic signaling behavior, and user interaction behavior are explored for identity verification.
Fraud detection methods are detailed for loan fraud, securities fraud, collusion fraud, purchase fraud, misinformation, trojans, ransomware, spyware, phishing attacks, cyberattacks.
Malicious intrusion risks such as trojans, ransomware, spyware are discussed along with detection frameworks using machine learning algorithms.
Stats
"The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness."
"According to different levels of appropriateness and degrees of custodies..."
"In a broad sense...behavioral authentication is not only an innovative and promising method due to its inherent advantages but also a critical and fundamental problem..."
Quotes
"A system is secure or safe can be judged by whether the behavior of certain agent(s) is appropriate or not."
"Behavioral authentication is not only an innovative method but also a critical problem due to the ubiquity of behavior generation."