TY - GEN
T1 - BehaveSec
T2 - 6th International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2025, held as part of the 27th HCI International Conference, HCII 2025
AU - Mollo, Mpho
AU - Mpekoa, Noluntu
AU - Tom, Sheethal
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025
Y1 - 2025
N2 - A considerable number of mobile phone devices are utilized globally for both personal and professional purposes. These devices house sensitive information that requires careful protection to ensure it remains secure from unauthorized access and potential threats. Given that these devices contain a substantial amount of sensitive information, they have garnered noticeable interest from cybercriminals, positioning them as appealing targets for potential attacks. In light of the growing concerns surrounding cyber threats, it has become essential to explore and adopt practical security measures that effectively align with the diverse ways in which devices are utilized. This research underscores the need for a more efficient solution that offers users continuous authentication by leveraging their application usage patterns through behavioral biometrics. The proposed solution, BehaveSec addresses this need by providing non-intrusive, real-time authentication by analysing user interaction with mobile applications. BehaveSec aims to enhance mobile phone security by monitoring user behavior for any deviations from established patterns. By identifying anomalies, BehaveSec proactively prevents potential cyber-attacks. The proposed solution comprises of an Android application on the front end and several machine learning models on the back end. A comparison was made on several machine learning models, specifically Logistic Regression, Support Vector Machines, and Random Forest. The models process the user data and analyze the data to verify authentication status. Accuracy, training time and validation loss were evaluated. The results highlight the trade-offs between these models and help recommend the most appropriate model based on the performance metrics for mobile behavioural biometrics. However, further precision and adaptive learning improvements are necessary to maintain effectiveness as user behaviour evolves.
AB - A considerable number of mobile phone devices are utilized globally for both personal and professional purposes. These devices house sensitive information that requires careful protection to ensure it remains secure from unauthorized access and potential threats. Given that these devices contain a substantial amount of sensitive information, they have garnered noticeable interest from cybercriminals, positioning them as appealing targets for potential attacks. In light of the growing concerns surrounding cyber threats, it has become essential to explore and adopt practical security measures that effectively align with the diverse ways in which devices are utilized. This research underscores the need for a more efficient solution that offers users continuous authentication by leveraging their application usage patterns through behavioral biometrics. The proposed solution, BehaveSec addresses this need by providing non-intrusive, real-time authentication by analysing user interaction with mobile applications. BehaveSec aims to enhance mobile phone security by monitoring user behavior for any deviations from established patterns. By identifying anomalies, BehaveSec proactively prevents potential cyber-attacks. The proposed solution comprises of an Android application on the front end and several machine learning models on the back end. A comparison was made on several machine learning models, specifically Logistic Regression, Support Vector Machines, and Random Forest. The models process the user data and analyze the data to verify authentication status. Accuracy, training time and validation loss were evaluated. The results highlight the trade-offs between these models and help recommend the most appropriate model based on the performance metrics for mobile behavioural biometrics. However, further precision and adaptive learning improvements are necessary to maintain effectiveness as user behaviour evolves.
KW - behavioral
KW - biometric authentication
KW - continuous authentication
KW - machine learning
KW - mobile security
UR - https://www.scopus.com/pages/publications/105008664924
U2 - 10.1007/978-3-031-93064-5_7
DO - 10.1007/978-3-031-93064-5_7
M3 - Conference contribution
AN - SCOPUS:105008664924
SN - 9783031930638
T3 - Lecture Notes in Computer Science
SP - 103
EP - 117
BT - Human-Centered Design, Operation and Evaluation of Mobile Communications - 6th International Conference, MOBILE 2025, Held as Part of the 27th HCI International Conference, HCII 2025, Proceedings
A2 - Wei, June
A2 - Margetis, George
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 22 June 2025 through 27 June 2025
ER -