=Paper=
{{Paper
|id=Vol-3188/paper9
|storemode=property
|title=Behavioral Biometry as a Cyber Security Tool
|pdfUrl=https://ceur-ws.org/Vol-3188/paper9.pdf
|volume=Vol-3188
|authors=Maryna Chyzhevska,Nataliia Romanovska,Andrii Ramskyi,Vitalii Venger,Mykola Obushnyi
|dblpUrl=https://dblp.org/rec/conf/cpits/ChyzhevskaRRVO21
}}
==Behavioral Biometry as a Cyber Security Tool==
Behavioral Biometry as a Cyber Security Tool
Maryna Chyzhevska1, Nataliia Romanovska2, Andrii Ramskyi3, Vitalii Venger2,
and Mykola Obushnyi4
1
National University “Yuri Kondratyuk Poltava Polytechnic,” 24 Pervomaiskyi ave., Poltava, 36011, Ukraine
2
State Institution “Institute for Economics and Forecasting, NAS of Ukraine,” 26 Panasa Myrnoho str., Kyiv,
01011, Ukraine
3
Borys Grinchenko Kyiv University, 18/2 Bulvarno-Kudriavska str., Kyiv, 04053, Ukraine
4
Taras Shevchenko National University of Kyiv, 60 Volodymyrska str., Kyiv, 01033, Ukraine
Abstract
With the intensification of digitalization of all processes and activities, the issue of information
protection and increasing the level of cyber security is becoming important. Particular attention
in this aspect should be focused on the field of queuing. The article provides a brief overview
of digital transformation and data protection, which shows that the largest share is occupied by
accidents of server equipment, infrastructure / network equipment, applications, data storage
system equipment and cyber attacks. The authors focus on key aspects and trends related to the
cyber threat landscape; argued the need to introduce new tools for biometric identification and
authentication, the most promising of which is behavioral biometrics. The proposed
comparative characteristic of types of behavioral biometrics allowed to define spheres of their
application and to reveal the drawbacks and advantages.
Keywords 1
Cybers security, cyber attack, cyber threats, identification, authentication, digitalization,
behavioral biometrics.
1. Introduction
The last two years have been significant for the whole world in the paradigm shift of public
communications, which has led to the intensification of their digitalization. Despite the fact that traffic
in certain industries and activities has decreased, the number of fraudsters remains the same or even
increases. This makes the security situation much more complex and dynamic, as new threats become
much larger than before. There is a need to develop new approaches to effective technical solutions and
take into account the problem of cyber security. In addition, the global COVID-19 pandemic and the
resulting quarantine restrictions have changed the global communication landscape and approaches to
the use of digital services. Businesses and consumers around the world are forced to respond quickly to
changing realities.
2. Digital Transformation and Data Protection
2.1. The Main Problems of Cyber Security
Following the landmark attacks on SolarWinds in December 2020 and Microsoft Exchange in
January 2021, new attempts have been made in recent months. The operators of the extortionist
programs carried out incidents with high consequences - at Colonial Pipeline and JBS Foods, at Quanta,
Acer and Kaseya - and demanded ever higher ransoms.
CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, October 26, 2021, Kyiv, Ukraine
EMAIL: marfin.poltava@gmail.com (M. Chyzhevska); romnatalina@gmail.com (N. Romanovska); a.ramskyi@kubg.edu.ua (A. Ramskyi);
vengerv@ukr.net (V. Venger); mobushnyy@gmail.com (M. Obushnyi)
ORCID: 0000-0003-1637-9564 (M. Chyzhevska); 0000-0002-1377-7551 (N. Romanovska); 0000-0001-7368-697X (A. Ramskyi); 0000-
0003-1018-0909 (V. Venger); 0000-0002-9121-5095 (M. Obushnyi)
©️ 2022 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
88
For industrial organizations, the number of attacks by extortionist programs increased by 500% in
the period from 2018 to 2021, and another 116% - only in the period from January to May 2021 [1].
A total of 20120074547 records were broken. In early 2021, Veeam conducted extensive research
on data protection. Based on the results, the Veeam Data Protection Report-2021 was written (Table 1).
The data show that the largest share is occupied by accidents of server equipment, infrastructure /
network equipment, applications, storage system equipment and cyber attacks. According to Forbes, in
2020, 1120 leaks and cyber attacks were recorded. Most of these incidents have been reported by the
world's leading media.
Table 1
Causes of equipment failure and disconnection of services, %
Indicator Causes of The most The most
accidents important for 2020 important for 2021
Server equipment failure 57 13 12
Infrastructure / network equipment 57 8 16
failure
Application crash 56 6 11
Data storage system hardware failure 51 15 8
Cyber attacks 51 7 16
Operating system failure 50 22 9
Administrator error in settings 46 6 6
Public cloud failure 45 10 8
Accidental deletion, overwriting or 44 3 8
data corruption
Intentional actions by the 37 8 5
administrator or user
2.2. Cyber Threats During the COVID-19 Pandemic
Countries, organizations and citizens have been greatly affected by the COVID-19 pandemic, which
has changed the conditions of activity, the activity itself and even life as a whole. Note that most cyber
attacks are usually not publicized due to reputational risks, and therefore it is extremely difficult to
calculate the exact number of threats, even for organizations involved in investigating incidents and
analyzing the actions of hacker groups. Most of these studies aim to draw the attention of organizations
and ordinary citizens who are interested in the current state of information security, to the most relevant
methods and motives of cyber attacks as well as to identify major trends in the change of the landscape
of cyber threats [2].
Let’s highlight key aspects and trends related to the cyber threat landscape [3–5]:
during the COVID-19 pandemic, the number of fake websites for online shopping and
fraudulent online sellers increased. From copies of popular brand websites to fraudulent services
that never supply the product, the corona virus has identified weaknesses in the trust model used in
online stores;
with the COVID-19 pandemic, the number of cyber bullying and extortion cases has also
increased. The introduction of mobile technologies and subscriptions to digital platforms make both
the younger generation and the elderly more vulnerable to these types of threats;
fraudsters use social media platforms to increase the effectiveness of targeted attacks, and
financial rewards are still the main motivation for most cyber attacks;
clearly targeted and ongoing attacks on valuable data, such as intellectual property and state
secrets, are carefully planned and often carried out by state-funded entities. Massive attacks with a
short duration and wide impact are used for various purposes, such as, for example, theft of
credentials;
89
the number of phishing victims in the EU continues to rise when criminals use the COVID-19
theme to lure “customers.” COVID-19-themed attacks include messages and file attachments that
contain malicious links to redirect users to phishing sites or malware;
business e-mail manipulation and attacks are used in cyber fraud, resulting in the loss of
millions of Euros for EU citizens and corporations. European small and medium-sized enterprises
have also fallen victim to these threats;
many cases of cyber security still go unnoticed or are detected over time. The number of
potential threats in the virtual or physical environment continues to expand as a new phase of digital
transformation emerges.
Organized crime groups are taking advantage of the situation, uncertainty and doubts caused by
COVID-19 and inventing new ways to pose threats to IT and cyber security. In turn, businesses and
people want to have more information and support and be protected. Consumers want more control
over personal information and guarantees about its security in terms of content and secrecy from third
parties [6–9].
3. Biometric Information Protection
3.1. Biometric Authentication Technologies
In these conditions the use of biometrics as an effective means of confirming the correctness of
identification is important in solving queuing problems. It is quite attractive for an organization to
control any access, as biometrics provides a high level of authentication and can be integrated into any
access control system with different keys and passwords [10].
Threats to biometric systems can occur in the form of fictitious data transmission, when an attempt
is made to undermine the principles of system security by providing natural biometric characteristics or
artifacts that contain copied or forged characteristics in the middle.
Control access systems can be divided into three classes according to what a person has to present:
what he or she knows; what he or she owns; what is part of himself/ herself.
Biometrics uses scientifically justified methods to describe and measure the characteristics of the
body of living beings [11]. In relation to automatic identification systems, the term “biometric” means
that these systems and methods are based on the use of unique qualities of the human body for
identification and authentication.
Biometric identification is often called real authentication because it is based on a person's personal
characteristics, not on virtual keys or passwords. A feature of biometric identification is the large size
of biometric databases: each of the samples is compared with all available records in the database. For
use in real life, such a system requires a high speed comparison of biometric characteristics.
Two methods of authentication are used in biometrics:
1. Verification:
measurement data are compared with one record offered by an external identifier (nickname,
password or other identifier) from the database of registered users;
2. Identification:
the measurement data is compared with all entries in the database of registered users, and not
only with one of them, selected on the basis of the identifier.
The main purpose of biometrics is to create a registration system that rarely denies access to
legitimate users and at the same time completely eliminates the possibility of authorization of attackers.
3.2. Features of Application of Behavioral Biometrics
Modern authentication technology is behavioral biometrics, which involves the collection of a
variety of data [12,13]. For example, a smart phone that collects behavioral information may obtain
multiple measurement points to estimate the likelihood of fraudulent activity, while static biometrics
provides less raw data [14]. The combination of behavioral characteristics in different mathematical
algorithms makes it possible to obtain a more multifaceted user profile, which allows you to weed out
fraudsters. Its value lies in the fact that it can detect fraud at an early stage before the cyber attack.
90
Behavioral biometrics can be adapted to a variety of devices, including smart phone operating
systems as a whole, not just applications. Each person has unique features of interaction with their
digital devices: the speed of typing on the keyboard, the force of pressing or the angle at which the
fingers move across the screen. It is almost impossible to reproduce such behavior by any another
person.
While behavioral biometrics is most commonly used by banks and financial institutions today,
experts are expected to use it in e-commerce, online services, healthcare, government and in many more
spheres in the near future [15].
Of course, as in any promising technology, there are pros and cons. Among the first are: inaccuracies
in identification due to the fact that user behavior is not always constant, which is associated with, for
example, fatigue, intoxication, malaise or haste, as well as the availability of many personal data to
determine standard behavior of a user. The positive features include the fact that each user has their
own unique set of behavioral characteristics that are analyzed; to perform the identification does not
require a change in the script intended for the user: the method of seamless integration; increased
recognition accuracy in multifactor identification systems [16].
There are several methods of behavioral biometrics [17]. Their comparative characteristics are
presented in Table 2.
Table 2
Methods of behavioral biometrics
Security
Usage
Industry level /
Method Description scenarios or Pros Cons
leaders accurac
scope
y level
Keystroke Brings Typing DNA, ID Device user High/hig No special The rhythm
dynamics standard Control, identification, h equipment of typing may
passwords to BehavioSec part of required; change due
a new level by multifactor speed and to fatigue,
tracking the authenticatio safety; illness,
rhythm of n, is used for difficult to exposure to
their input. surveillance copy by drugs or
Such sensors observation alcohol,
can respond changes in
to the time the keyboard;
required to it is not
press each possible to
key, the delay identify the
between the same person
keys, the using
number of different
characters keyboard
entered per layouts
minute, etc.
Keyboard
templates
work with
passwords
and PINs to
increase
security.
Signature A pen and a Aerial, Redrock Verification High/ It is almost High error
recognitio special tablet Biometrics, and average impossible rate until the
n connected to Sense, Oxford authorization to forge; user gets
a computer University, of documents, Widesprea used to the
are used to identification d in notebook for
91
compare and Mobbeel in the banking business signing; hand
check sector practice; injuries can
patterns. A fast and affect the
high-quality safe; recognition
tablet can ease of accuracy
capture integration
behavioral
characteristic
s such as
speed,
pressure, and
time spent
signing. At the
registration
stage, a
person must
sign up
several times
on a tablet to
collect data.
Then,
signature
recognition
algorithms
extract
unique
characteristic
s such as
time,
pressure,
speed,
direction of
impact,
important
points on the
signature
path, and
signature size.
The algorithm
assigns
different
degrees of
importance to
these points
Recognitio The user must Apple Inc, Telephone High/low Ease of Sensitivity of
n of the say the word Microsoft, and Internet integration; technology to
speaker or phrase into Google LLC transactions, fast quality of a
the audio recognition microphone
microphone. signatures for time; and noise;
This is digital contactless risk of
necessary to documents, scanning counterfeitin
obtain a online g
sample of education
human systems,
language. The emergency
electrical services
signal of the
92
microphone
will be
converted to
digital using
an analog-to-
digital
converter. It
is written to
computer
memory in
the form of a
digitized
sample. The
computer
then
compares and
tries to
compare the
voice of the
person
speaking with
the stored
digitized
sample and
identifies the
person.
Speaker
recognition
focuses on
the context of
the phrase
said by the
user, not on
the
recognition of
his voice
Voice Voice Nuance Online High/low Ease of Risk of
recognitio recognition Communication banking integration; counterfeitin
n function s, Google LLC, sector, fast g; inability to
compares a Amazon.com, emergency recognition reduce
spoken Apple Inc. services, call time; external
phrase to a center contactless noise;
digital recognition, scanning. problems
pattern. It is high demand . with
used as a for voice recognition
means of recognition in accuracy
identification healthcare
and
authenticatio
n in security
systems such
as access
control and
timekeeping.
The system
creates digital
93
templates
with a very
high
probability of
correct
interpretation
. Each
person's voice
includes
physiological
and
behavioral
characteristic
s.
Physiological
aspects
depend on
the size and
shape of the
mouth,
throat, larynx,
nasal cavity,
body weight
and other
factors.
Behavioral
traits depend
on language,
level of
education
and place of
residence,
which can
lead to
certain
intonations,
accents and
dialects
Recognitio Stroke SFootBD, Medicine and Low/low Contactless Not as
n on the biometrics Watrix, Cometa criminology scanning; reliable as
go captures step Srl possibility other
patterns using to cover a biometric
video and large area; methods;
then converts fast clothing and
the mapped recognition footwear can
data into a time. affect the
mathematical Technology accuracy of
equation. This is evolving recognition
type of rapidly
biometrics is
invisible,
making it
ideal for mass
crowd
monitoring.
Another
94
advantage is
that these
systems can
quickly
identify
people at a
long distance
Movement Lip Hong Kong Can be used High/low Contactless The
of lips` recognition is Baptist to improve scanning; technology is
recognitio one of the University, security fast being refined
n newest forms AimBrain, Liopa systems and recognition
of biometric complement time;
verification. biometrics increases
Just as a deaf such as face the
person can recognition, accuracy of
track the retina recognition
movement of scanning, and in
the fingerprinting combinatio
interlocutor's n with
lips, biometric other forms
systems of
record the biometrics
activity of the
muscles
around the
mouth,
forming a
pattern of
movement.
Biometric
sensors of
this type
often require
the user to
repeat the
password to
determine
the
appropriate
lip
movements,
and then
allow or deny
access based
on a
comparison
with the
recorded
sample.
Biometric data can be stored on different media depending on the type and specific biometric
technology. Data can be stored on a biometric database server as part of public infrastructure or can be
physically distributed to private companies. Biometric data can also be stored on smart phones that use
fingerprint and face recognition technology.
None of the above personal characteristics of an individual can be compared in reliability of
recognition with the genetic code of a person. However, practical methods of identification that use the
95
unique features of fragments of the genetic code are currently rarely used due to their complexity and
high cost.
4. Conclusions
Thus, the identification of the individual as the consumer of information is becoming increasingly
important. It explains the huge interest in biometric technologies and the role of information, and hence
its protection from unauthorized access. They are quite attractive for the organization in charge of
access, as they provide a high level of authentication, can be integrated into any access control system
simultaneously with different keys and passwords.
5. References
[1] Dangerous extortionist programs attack: how not to become the next victim.
https://eset.ua/ua/news/view/903/opasnyye-programmy-vymogateli-atakuyut-kak-ne-stat-
sleduyushchey-zhertvoy
[2] M.TajDini, et al., Wireless Sensors for Brain Activity—A Survey. In Electronics, Vol. 9, Issue 12,
2092. MDPI AG., 2020. https://doi.org/10.3390/electronics9122092
[3] Z. B. Hu, et al., Authentication System by Human Brainwaves Using Machine Learning and
Artificial Intelligence. In Advances in Computer Science for Engineering and Education IV, 374–
388, 2021. https://doi.org/10.1007/978-3-030-80472-5_31
[4] H. Shevchenko, et al., Information security risk analysis SWOT, in: Workshop on Cybersecurity
Providing in Information and Telecommunication Systems, CPITS, vol. 2923, 309–317, 2021.
[5] The threat of cyberattacks is growing due to the pandemic: EU report. https://yur-
gazeta.com/golovna/zagroza-kiberatak-zrostae-cherez-pandemiyu-zvit-es.html
[6] V. Buriachok, V. Sokolov, P. Skladannyi, Security rating metrics for distributed wireless systems,
in: Workshop of the 8th International Conference on "Mathematics. Information Technologies.
Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS), vol.
2386, 222–233, 2019.
[7] D. Berestov, et al., Analysis of features and prospects of application of dynamic iterative
assessment of information security risks, in: Workshop on Cybersecurity Providing in Information
and Telecommunication Systems (CPITS), vol. 2923, 329–335, 2021.
[8] F. Kipchuk, et al. Investigation of Availability of Wireless Access Points based on Embedded
Systems. 2019 IEEE International Scientific-Practical Conference Problems of
Infocommunications, Science and Technology (PIC S&T), 2019.
https://doi.org/10.1109/picst47496.2019.9061551
[9] V. Astapenya, et al., Analysis of Ways and Methods of Increasing the Availability of Information
in Distributed Information Systems. In 2021 IEEE 8th International Conference on Problems of
Infocommunications, Science and Technology (PICST), 2021. IEEE.
https://doi.org/10.1109/picst54195.2021.9772161
[10] L. Banga, S. Pillai, Impact of Behavioural Biometrics on Mobile Banking System, Journal of
Physics: Conference Series, Vol. 1964, 2021. https://iopscience.iop.org/article/10.1088/1742-
6596/1964/6/062109/pdf
[11] M. Shopon; S.N. Tumpa; Y. Bhatia; K.N. Pavan Kumar; M.L. Gavrilova. Biometric Systems De-
Identification: Current Advancements and Future Directions. J. Cybersecur. Priv. 2021, 1, 470–
495.
[12] A. Dantcheva; P. Elia; A. Ross. What else does your biometric data reveal? A survey on soft
biometrics. IEEE Trans. Inf. Forensics Secur. 2015, 11, 441–467.
[13] M. Sultana; P.P. Paul; M. Gavrilova. Social behavioral biometrics: An emerging trend. Int. J.
Pattern Recognit. Artif. Intell. 2015, 29, 1556013.
[14] S.N. Tumpa; K.P. Kumar; M. Sultana; G.S.J. Hsu; O. Yadid-Pecht; S. Yanushkevich;
M.L. Gavrilova. Social Behavioral Biometrics in Smart Societies. In Advancements in Computer
Vision Applications in Intelligent Systems and Multimedia Technologies; IGI Global: Hershey,
PA, USA, 2020; pp. 1–24.
96
[15] F. Bahmaninezhad; C. Zhang; J.H. Hansen. Convolutional Neural Network Based Speaker De-
Identification. Odyssey, 2018, 255–260. https://www.semanticscholar.org/paper/Convolutional-
Neural-Network-Based-SpeakerBahmaninezhad-
Zhang/f2cd2f81b188166058ea04b454a4c59135d744a5
[16] Y.R. Vampolskiy, V. Govindaraju. Behavioural biometrics: a survey and classification, Int. J.
Biometrics, 2008, Vol. 1, No. 1, 81–113.
[17] A.K. Anil, K. Jain, Biometrics of Next Generation—An Overview. http://biometrics.cse.msu.edu/
Publications/GeneralBiometrics/JainKumarNextGenBiometrics_BookChap10.pdf
97