International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | Intelligent Behavioral Cyber Lock – Securing Apps through user Behavior |
|---|---|
| ABSTRACT | Behavioral biometrics offers a compelling solution for strengthening authentication on personal devices by continuously verifying user identity during active sessions. Existing security mechanisms, such as passwords, personal identification numbers (PINs), and single-use biometric checks, perform authentication only at the moment of access, thereby creating a security gap once the device is unlocked. To address this limitation, this study presents an intelligent cyber-lock system that continuously analyzes user behavior using multiple interaction-based traits, including typing patterns, touch interaction behavior, and motion sensor data. The proposed system employs a lightweight machine-learning model that operates entirely on the device, enabling real-time authentication while preserving user privacy by avoiding the transmission or storage of raw behavioral data on external servers. A dynamic risk assessment module evaluates ongoing interactions and categorizes them into different trust levels, enabling appropriate responses such as alerts, restricted access, or additional verification when abnormal behavior is detected. Experimental evaluation demonstrates that the system achieves high authentication accuracy with low false acceptance and false rejection rates, while maintaining minimal computational and energy overhead. These results confirm that continuous behavioral authentication can significantly enhance device security without compromising usability or user experience. |
| AUTHOR | SNEHA Y M, RAKSHITA MATHAD, PAVITHRA M K, RANJITA F SANNAGOUDRA, SAHANA K A Department of Information Science and Engineering, Jain Institute of Technology, (VTU), Davangere, Karnataka, India |
| VOLUME | 180 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1401018 |
| pdf/18_Intelligent Behavioral Cyber Lock – Securing Apps through user Behavior.pdf | |
| KEYWORDS | |
| References | [1] R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Communications of the ACM, vol. 33, no. 2, pp. 168–176, 1990. [2] Y. Zhong, Y. Deng, and A. K. Jain, “Keystroke dynamics for user authentication,” IEEE/ACM Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 566–579, 2016. [3] C. Trojahn et al., “Continuous authentication on mobile devices using accelerometer and gyroscope,” IEEE Transactions on Mobile Computing, vol. 17, no. 11, pp. 2582–2592, 2018. [4] T. Hayajneh et al., “A risk-based authentication and access control framework,” Journal of Network and Computer Applications, vol. 34, no. 6, pp. 1792–1802, 2011. [5] S. Li et al., “Adaptive authentication for cloud storage,” IEEE Transactions on Cloud Computing, vol. 7, no. 2, pp. 412–425, 2019. [6] TensorFlow Lite, “On-device machine learning framework.” [Online]. Available: https://www.tensorflow.org/lite [7] ONNX Runtime, “Cross-platform inference engine.” [Online]. Available: https://onnxruntime.ai/ [8] European Commission, “General Data Protection Regulation (GDPR),” Official Journal of the European Union, L119, pp. 1–88, 2018. [9] U.S. Department of Health and Human Services, “Health Insurance Portability and Accountability Act (HIPAA) Security Rule,” 45 CFR §164, 2013. [10] S. Mondal and P. Bours, “A study on continuous authentication using behavioral biometrics,” IEEE Access, vol. 7, pp. 13181–13190, 2019. [11] A. Acien, A. Morales, R. Vera-Rodriguez, and J. Fierrez, “Measuring the vulnerability of biometric systems to spoofing attacks,” IEEE Access, vol. 6, pp. 72012–72027, 2018. [12] J. Frank, S. Mannor, and D. Precup, “Activity and gait recognition with time-delay embeddings,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 8, pp. 1901–1915, 2013. [13] N. Serwadda and V. V. Phoha, “When kids’ toys breach mobile phone security,” Proceedings of the ACM Conference on Computer and Communications Security, pp. 599–610, 2013. [14] Conference, pp. 374–388, 2019. |