Identity theft, computers and behavioral biometrics

  • Authors:
  • Robert Moskovitch;Clint Feher;Arik Messerman;Niklas Kirschnick;Tarik Mustafic;Ahmet Camtepe;Bernhard Löhlein;Ulrich Heister;Sebastian Möller;Lior Rokach;Yuval Elovici

  • Affiliations:
  • Deutsche Telekom Laboratories, Ben Gurion Univeristy, Be'er Sheva, Israel;Deutsche Telekom Laboratories, Ben Gurion Univeristy, Be'er Sheva, Israel;DAI-Labor, Technical University of Berlin, Berlin, Germany;Quality and Usability Lab, Deutsche Telekom Laboratories, TU Berlin, Berlin, Germany;DAI-Labor, Technical University of Berlin, Berlin, Germany;DAI-Labor, Technical University of Berlin, Berlin, Germany;Deutsche Telekom, Laboratories, Darmstadt, Germany;Deutsche Telekom, Laboratories, Darmstadt, Germany;Quality and Usability Lab, Deutsche Telekom Laboratories, TU Berlin, Berlin, Germany;Deutsche Telekom Laboratories, Ben Gurion Univeristy, Be'er Sheva, Israel;Deutsche Telekom Laboratories, Ben Gurion Univeristy, Be'er Sheva, Israel

  • Venue:
  • ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.