Identity theft, computers and behavioral biometrics

Moskovitch, Robert, Feher, Clint, Messerman, Arik, Kirschnick, Niklas, Mustafic, Tarik, Camtepe, Seyit A., Loehlein, Bernhard, Heister, Ulrich, Moeller, Sebastian, Rokach, Lior, & Elovici, Yuval (2009) Identity theft, computers and behavioral biometrics. In Proceedings of the IEEE international conference on Intelligence and security informatics, IEEE Press, Piscataway, N. J., pp. 155-160.

View at publisher


The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Impact and interest:

17 citations in Scopus
Search Google Scholar™
9 citations in Web of Science®

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 58024
Item Type: Conference Paper
Refereed: Yes
Keywords: identity theft, behavioural biometrics
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2009 IEEE Press
Deposited On: 11 Mar 2013 01:42
Last Modified: 24 Jul 2013 00:56

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page