Enhancing Security through Multi-Factor User Behavior Identification: Moving Beyond the Use of the Longest Common Subsequence (LCS)

Boumedyen Shannaq, Mohanaad Talal Shakir

Abstract


The proposed approach comprises a set of strategies and tools to protect user-sensitive data, such as passwords, from unauthorized access, misuse, or loss. It aims to identify unauthorized users, often attackers who have obtained passwords, attempting to change authorized user passwords. By employing the Longest Common Subsequence (LCS) algorithm, the proposed method compares the current user password (AUP) with the unauthorized user's intended password update (UUP). This comparison reveals shared patterns between the two passwords, aiding in detecting unauthorized access attempts. For example, recurring patterns in password updates could serve as biometric security factors, allowing for the identification of user actions when updating sensitive data like passwords. This study enhances the CR approach associated with Electronic Personal Synthesis Behavior (EPSB) by introducing the Utilized Longest Common Subsequence (LCS) to address challenges such as the unavailability of user password history and password length. Our experiments indicate that the CR fails to identify the authorized user in 75 users and succeeds only 52% of cases when unauthorized users attempt to change the password. In contrast, our proposed method fails only 28.66% and succeeds with 102% of the time out of 141 data tests. Thus, the proposed algorithm is more effective to implement and could improve security levels significantly.


Full Text:

PDF

References


A. Szymkowiak, B. Melović, M. Dabić, K. Jeganathan, and G. S. Kundi, “Information technology and Gen Z: The role of teachers, the internet, and technology in the education of young people,” Technology in Society, vol. 65, p. 101565, May 2021, doi: 10.1016/j.techsoc.2021.101565.

E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, “Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework,” Inf Syst Front, vol. 24, no. 2, pp. 393–414, Apr. 2022, doi: 10.1007/s10796-020-10044-1.

Y. P. Tsang, K. L. Choy, C. H. Wu, G. T. S. Ho, and H. Y. Lam, “Blockchain-Driven IoT for Food Traceability With an Integrated Consensus Mechanism,” IEEE Access, vol. 7, pp. 129000–129017, 2019, doi: 10.1109/ACCESS.2019.2940227.

V. Papaspirou, L. Maglaras, M. A. Ferrag, I. Kantzavelou, H. Janicke, and C. Douligeris, “A novel Two-Factor HoneyToken Authentication Mechanism,” in 2021 International Conference on Computer Communications and Networks (ICCCN), Jul. 2021, pp. 1–7. doi: 10.1109/ICCCN52240.2021.9522319.

M. Hazratifard, F. Gebali, and M. Mamun, “Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial,” Sensors, vol. 22, no. 19, Art. no. 19, Jan. 2022, doi: 10.3390/s22197655.

E. James and F. Rabbi, “Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems,” Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, vol. 6, no. 1, Art. no. 1, Jan. 2023.

S. Das, B. Wang, Z. Tingle, and L. J. Camp, “Evaluating User Perception of Multi-Factor Authentication: A Systematic Review.” arXiv, Aug. 16, 2019. doi: 10.48550/arXiv.1908.05901.

I. Stylios, S. Kokolakis, O. Thanou, and S. Chatzis, “Behavioral biometrics & continuous user authentication on mobile devices: A survey,” Information Fusion, vol. 66, pp. 76–99, Feb. 2021, doi: 10.1016/j.inffus.2020.08.021.

F. Guarracino et al., “Noninvasive Ventilation for Awake Percutaneous Aortic Valve Implantation in High-Risk Respiratory Patients: A Case Series.,” Journal of cardiothoracic and vascular anesthesia, vol. 294, no. 24, pp. 3124–3130, 2010, doi: 10.1053/j.jvca.2010.06.032.

S. Ahmed, I. E. Nielsen, A. Tripathi, S. Siddiqui, R. P. Ramachandran, and G. Rasool, “Transformers in time-series analysis: A tutorial,” Circuits, Systems, and Signal Processing, vol. 42, no. 12, pp. 7433–7466, 2023.

A. Zeng, M. Chen, L. Zhang, and Q. Xu, “Are transformers effective for time series forecasting?,” in Proceedings of the AAAI conference on artificial intelligence, 2023, pp. 11121–11128.

H. A. Jeng et al., “Application of wastewater-based surveillance and copula time-series model for COVID-19 forecasts,” Science of The Total Environment, vol. 885, p. 163655, 2023.

M. Soltani, M. Khashei, and N. Bakhtiarvand, “A Novel Discrete Deep Learning--Based Cancer Classification Methodology,” Cognitive Computation, pp. 1–19, 2023.

M. Shakir, “User Authentication In Public Cloud Computing Through Adoption Of Electronic Personal Synthesis Behavior,” Uniten, 2020.

M. Shakir, A. B. Abubakar, Y. Yousoff, M. Al-Emran, and M. Hammood, “APPLICATION OF CONFIDENCE RANGE ALGORITHM IN RECOGNIZING USER BEHAVIOR THROUGH EPSB IN CLOUD COMPUTING,” Journal of Theoretical and Applied Information Technology, vol. 94, no. 2, p. 416, 2016.

M. Shakir, “Applying Human Behaviour Recognition in Cloud Authentication Method—A Review,” in International Conference on Emerging Technologies and Intelligent Systems, 2021, pp. 565–578.

M. Shakir, A. ABUBAKAR, Y. Yusoff, M. Al-Emran, and M. Hammood, “Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing,” Journal of Theoretical and Applied Information Technology, vol. 94, p. 416_427, Dec. 2016.

M. Shakir, “Applying Human Behaviour Recognition in Cloud Authentication Method—A Review,” in Proceedings of International Conference on Emerging Technologies and Intelligent Systems, M. Al-Emran, M. A. Al-Sharafi, M. N. Al-Kabi, and K. Shaalan, Eds., Cham: Springer International Publishing, 2022, pp. 565–578. doi: 10.1007/978-3-030-85990-9_45.

M. Shakir, M. Hammood, and A. Kh. Muttar, “Literature review of security issues in saas for public cloud computing: a meta-analysis,” IJET, vol. 7, no. 3, p. 1161, Jun. 2018, doi: 10.14419/ijet.v7i3.13075.

C. S. Lee and Y. Wang, “Typology of Cybercrime Victimization in Europe: A Multilevel Latent Class Analysis,” Crime & Delinquency, vol. 70, no. 4, pp. 1196–1223, Apr. 2024, doi: 10.1177/00111287221118880.

E. Al Alkeem et al., “An enhanced electrocardiogram biometric authentication system using machine learning,” IEEE Access, vol. 7, pp. 123069–123075, 2019.

M. Papathanasaki, L. Maglaras, and N. Ayres, “Modern Authentication Methods: A Comprehensive Survey,” AI, Computer Science and Robotics Technology, Jun. 2022, doi: 10.5772/acrt.08.

D. Tirfe and V. K. Anand, “A Survey on Trends of Two-Factor Authentication,” in Contemporary Issues in Communication, Cloud and Big Data Analytics, H. K. D. Sarma, V. E. Balas, B. Bhuyan, and N. Dutta, Eds., Singapore: Springer Singapore, 2022, pp. 285–296.

D. Progonov, V. Cherniakova, P. Kolesnichenko, and A. Oliynyk, “Behavior-based user authentication on mobile devices in various usage contexts,” EURASIP Journal on Information Security, vol. 2022, no. 1, p. 6, 2022.

M. Shakir, R. Abood, M. Sheker, M. Alnaseri, M. Al-hashimi, and R. M. Tawafak, “Users Acceptance of Electronic Personal Synthesis Behavior ( EPSB ): An Exploratory Study,” Recent Advances in Technology Acceptance Models and Theories, Part of the Studies in Systems, Decision and Control book series, vol. 135, pp. 509–520, 2021.

H. Wu, H. Han, X. Wang, and S. Sun, “Research on artificial intelligence enhancing internet of things security: A survey,” Ieee Access, vol. 8, pp. 153826–153848, 2020.

M. SHAKIR, A. ABUBAKAR, Y. YOUSOFF, M. WASEEM, and M. AL-EMRAN, “MODEL OF SECURITY LEVEL CLASSIFICATION FOR DATA IN HYBRID CLOUD COMPUTING.,” Journal of Theoretical & Applied Information Technology, vol. 94, no. 1, 2016.

S. Roopashree, J. Anitha, T. R. Mahesh, V. V. Kumar, W. Viriyasitavat, and A. Kaur, “An IoT based authentication system for therapeutic herbs measured by local descriptors using machine learning approach,” Measurement, vol. 200, p. 111484, 2022.

P. H. Basha, G. Prathyusha, D. N. Rao, V. Gopikrishna, P. Peddi, and V. Saritha, “AI-Driven Multi-Factor Authentication and Dynamic Trust Management for Securing Massive Machine Type Communication in 6G Networks,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 1s, pp. 361–374, 2024.

T. Bin Shams, M. S. Hossain, M. F. Mahmud, M. S. Tehjib, Z. Hossain, and M. I. Pramanik, “EEG-based Biometric Authentication Using Machine Learning: A Comprehensive Survey,” ECTI Transactions on Electrical Engineering, Electronics, and Communications, vol. 20, no. 2, pp. 225–241, 2022.

M. Srinivasan and N. C. Senthilkumar, “Machine Learning-Based Security Enhancement in Heterogeneous Networks Using an Effective Pattern Mining Framework,” INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING, vol. 12, pp. 244–257, 2024.

A. Ashtari, B. Alizadeh, and others, “A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things,” Microprocessors and Microsystems, vol. 93, p. 104600, 2022.

P. C. Golar, “INTELLIGENT SYSTEMS AND APPLICATIONS IN Security Analysis of the Graphical Password-Based Authentication Systems with Different Attack Proofs,” vol. 11, pp. 155–165, 2023.

“Sensors | Free Full-Text | Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare.” Accessed: Dec. 17, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/21/8944

H. Alqahtani and G. Kumar, “Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems,” Engineering Applications of Artificial Intelligence, vol. 129, p. 107667, Mar. 2024, doi: 10.1016/j.engappai.2023.107667.

K. A. Shastry and A. Shastry, “An integrated deep learning and natural language processing approach for continuous remote monitoring in digital health,” Decision Analytics Journal, vol. 8, p. 100301, Sep. 2023, doi: 10.1016/j.dajour.2023.100301.

M. Alabadi and A. Habbal, “Next-generation predictive maintenance: leveraging blockchain and dynamic deep learning in a domain-independent system,” PeerJ Comput. Sci., vol. 9, p. e1712, Dec. 2023, doi: 10.7717/peerj-cs.1712.

M. S. Abdalzaher, M. M. Fouda, A. Emran, Z. M. Fadlullah, and M. I. Ibrahem, “A Survey on Key Management and Authentication Approaches in Smart Metering Systems,” Energies, vol. 16, no. 5, Art. no. 5, Jan. 2023, doi: 10.3390/en16052355.

L. Alawneh, M. Al-Zinati, and M. Al-Ayyoub, “User identification using deep learning and human activity mobile sensor data,” Int. J. Inf. Secur., vol. 22, no. 1, pp. 289–301, Feb. 2023, doi: 10.1007/s10207-022-00640-4.

P. A. Thomas and K. Preetha Mathew, “A broad review on non-intrusive active user authentication in biometrics,” J Ambient Intell Human Comput, vol. 14, no. 1, pp. 339–360, Jan. 2023, doi: 10.1007/s12652-021-03301-x.

B. Vyas and M. Nawaz, Java in Action : AI for Fraud Detection and Prevention. 2023. doi: 10.13140/RG.2.2.20929.33125.

H. Jebamikyous, M. Li, Y. Suhas, and R. Kashef, “Leveraging machine learning and blockchain in E-commerce and beyond: benefits, models, and application,” Discov Artif Intell, vol. 3, no. 1, p. 3, Jan. 2023, doi: 10.1007/s44163-022-00046-0.




DOI: https://doi.org/10.31449/inf.v48i19.6270

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.