Issue |
Security and Safety
Volume 3, 2024
|
|
---|---|---|
Article Number | 2024003 | |
Number of page(s) | 36 | |
Section | Digital Finance | |
DOI | https://doi.org/10.1051/sands/2024003 | |
Published online | 30 April 2024 |
Review
Behavioral authentication for security and safety
1
Department of Computer Science and Technology, Tongji University, Shanghai, 201804, China
2
Key Laboratory of Embedded System and Service Computing, Ministry of Education, Shanghai, 201804, China
3
Shanghai Artificial Intelligence Laboratory, Shanghai, 200232, China
* Corresponding authors (email: cwang@tongji.edu.cn (Cheng Wang); cjjiang@tongji.edu.cn (Changjun Jiang))
Received:
7
December
2023
Revised:
5
March
2024
Accepted:
18
March
2024
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain agent(s) is appropriate or not. Specifically, a so-called appropriate behavior involves the right agent performing the right actions at the right time under certain conditions. Then, according to different levels of appropriateness and degrees of custodies, behavioral authentication can be graded into three levels, i.e., the authentication of behavioral Identity, Conformity, and Benignity. In a broad sense, for the security and safety issue, behavioral authentication is not only an innovative and promising method due to its inherent advantages but also a critical and fundamental problem due to the ubiquity of behavior generation and the necessity of behavior regulation in any system. By this classification, this review provides a comprehensive examination of the background and preliminaries of behavioral authentication. It further summarizes existing research based on their respective focus areas and characteristics. The challenges confronted by current behavioral authentication methods are analyzed, and potential research directions are discussed to promote the diversified and integrated development of behavioral authentication.
Key words: behavioral authentication / security and safety / behavior modeling / anomaly detection / machine learning / artificial intelligence
Citation: Wang C, Tang H, Zhu HY, Zheng JH and Jiang CJ. Behavioral authentication for security and safety. Security and Safety 2024; 3: 2024003. https://doi.org/10.1051/sands/2024003
© The Author(s) 2024. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.