Cybersecurity : Enhancing Cybersecurity through Behavioral Biometrics



EOI: 10.11242/viva-tech.01.05.001

Download Full Text here



Citation

Prof. Chandani Patel1, Shruti Mankoji2 , Mansi Ghedia3 ,"Prof. Chandani Patel1, Shruti Mankoji2 , Mansi Ghedia3", VIVA-IJRI Volume 1, Issue 7, Article 1, pp. 1-12, 2024. Published by Master of Computer Application Department, VIVA Institute of Technology, Virar, India.

Abstract

Enhancing cybersecurity through behavioral biometrics involves leveraging unique patterns of behavior to authenticate and verify the identity of users. Unlike traditional authentication methods like passwords or tokens, behavioral biometrics focuses on the inherent and distinctive ways individuals interact with devices and systems. Here are some ways to enhance cybersecurity through behavioral biometrics.

Keywords

Cybersecurity, Keystroke Dynamics, Mouse Dynamics, Gesture Recognition, Behavioral Profiling, Biometric Fusion, User Education and Awareness, Risk Analysis, Attacks.

References

  1. [1] D.Santhadevi, "Biometric Authentication, Access-Control and Encryption For Cyber Security and Privacy".
  2. [2] Tomko, G. (1998), ―Biometrics as a Privacy-Enhancing Technology: Friend or Foe of Privacy?‖ Privacy Laws & Business, 9th Privacy Commissioners/Data Protection Authorities Workshop, Spain.
  3. [3] Potter, E. J. (2002). "Customer Authentication: The Evolution of Signature Verification in Financial Institutions." ISSN 2277-3061 6188 |
  4. [4] Catherine J. Tilton, " The Role of Biometrics in Enterprise Security" February 2006. Available: http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf.
  5. [5] ITU-T Technology Watch Report, "Biometrics and Standards " December 2009. Available: http://www.itu.int/dms_pub/itut/oth/23/01/T230100000D0002PDFE.pdf
  6. [6] QuestBiometrics, "Biometrics Access Control", 2005. Available: http://www.questbiometrics.com/biometric-accesscontrol.html
  7. [7] Chien Le, "A Survey of Biometrics Security Systems" November 28, 2011. Available: http://www.cse.wustl.edu/~jain/cse571-11/ftp/biomet.pdf [8] PBWORKS, "Advantages and Disadvantages of Technologies" Available:http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies.
  8. [8] O. Bitto, Encryption and biometrics: or arcane bits and touches.: Computer Media, 2005. ISBN 80-86686-48-5.
  9. [9] R. Rak, Biometrics and identity of people: the forensic and commercial applications, BEN, Prague, 2008. ISBN 978-80-247-2365-5.
  10. [10] Fingerprint structure imaging based on an ultrasound camera [online]. 2012 [cit. 2012-06-23]. .
  11. [11] T. Coufal, What is FingerChip [online]. 2007 [cit. 2012-04-29]. .
  12. [12] Nobility Series FP2 Flash [online]. c2007 [cit. 202-05-03]. .