Skip to main content

Continuous Authentication Using Writing Style

  • Chapter
  • First Online:
Biometric-Based Physical and Cybersecurity Systems

Abstract

The reinforcement of traditional static authentication by performing continuous authentication (CA) while the system is being used ensures that the user is legitimate throughout the computer usage. Stylometry can be a good candidate for CA since writing style can be acquired in a nonintrusive way and also is a good indicator of authorship. In using stylometry, the authentication process consists of comparing sample writing of an individual against the model or profile associated with the identity claimed by that individual at login time (i.e., one-to-one identity matching). Effective CA requires reauthenticating the user over a short period of time, which equates using a short text. Analyzing short texts is challenging since decision-making occurs on a limited amount of available information. High accuracy and resilience to forgery are other key challenges faced by CA. In this chapter, we discuss the key research challenges faced in using stylometry for CA, and we introduce an approach to tackle some of those challenges. Different classification techniques are investigated and evaluated using different public datasets, yielding encouraging performance results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Available at http://www.cs.cmu.edu/∼enron/

  2. 2.

    Available at http://www.uvic.ca/engineering/ece/isot/datasets/

References

  1. A.A.E. Ahmed, I. Traore, Dynamic sample size detection in continuous authentication using sequential sampling, in Proceedings of the 27th Annual Computer Security Applications Conference, New York, NY, USA, (2011)

    Google Scholar 

  2. M.E. Crosby, C.S. Ikehara, Continuous identity authentication using multimodal physiological sensors 5404 (2004), pp. 393–400

    Google Scholar 

  3. I. Traore, A. A. E. Ahmed (eds.), Continuous authentication using biometrics: continuous authentication using biometrics: data, models, and metrics (IGI Global, 2012), p. 385

    Google Scholar 

  4. R.S. Gaines, W. Lisowski, S.J. Press, N. Shapiro, Authentication by keystroke timing: some preliminary results. No. RAND-R-2526-NSF. Rand Corp Santa Monica CA, (1980)

    Google Scholar 

  5. A.A.E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE Trans. Depend. Sec. Comput. 4, 165–179 (2007)

    Article  Google Scholar 

  6. M. Koppel J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the 21st International Conference on Machine Learning, Banff, (2004)

    Google Scholar 

  7. L. Ballard, F. Monrose, D. Lopresti, Biometric authentication revisited: understanding the impact of wolves in sheepś clothing, in Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, (2006)

    Google Scholar 

  8. T.C. Mendenhall, The characteristic curves of composition. Science ns-9, 237–246 (1887)

    Article  Google Scholar 

  9. F. Mosteller, D.L. Wallace. Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers. Journal of the American Statistical Association 58(302), 275–309 (1963)

    MATH  Google Scholar 

  10. A. Abbasi, H. Chen, Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67–75 (2005)

    Article  Google Scholar 

  11. F. Iqbal, R. Hadjidj, B.C.M. Fung, M. Debbabi, A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5, S42–S51 (2008)

    Article  Google Scholar 

  12. F. Iqbal, L.A. Khan, B.C.M. Fung, M. Debbabi, E-mail authorship verification for forensic investigation, in Proceedings of the 2010 ACM Symposium on Applied Computing, New York, NY, USA, (2010)

    Google Scholar 

  13. F. Iqbal, H. Binsalleeh, B.C.M. Fung, M. Debbabi, A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231, 98–112 (2013)

    Article  Google Scholar 

  14. C.E. Chaski, Who's at the keyboard: authorship attribution in digital evidence investigations. Int. J. Digit. Evid. 4, 1–13 (2005)

    Google Scholar 

  15. J. Burrows, Delta: a measure of stylistic difference and a guide to likely authorship. Lit. Ling. Comput. 17, 267–287 (2002)

    Article  Google Scholar 

  16. E. Backer, P. van Kranenburg, On musical stylometry pattern recognition approach. Pattern Recogn. Lett. 26, 299–309 (2005)

    Article  Google Scholar 

  17. Y. Zhao, J. Zobel, Searching with style: authorship attribution in classic literature, in Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, Darlinghurst, (2007)

    Google Scholar 

  18. R.A.G.K. Sarawgi, Y. Choi, Gender attribution: tracing stylometric evidence beyond topic and genre, in Proceedings of the 15th Conference on Computational Natural Language Learning, Stroudsburg, (2011)

    Google Scholar 

  19. N. Cheng, X. Chen, R. Chandramouli, K.P. Subbalakshmi, Gender identification from e-mails, in Computational Intelligence and Data Mining, 2009. CIDM '09. IEEE Symposium on, (2009)

    Google Scholar 

  20. N. Cheng, R. Chandramouli, K.P. Subbalakshmi, Author gender identification from text. Digit. Investig. 8, 78–88 (2011)

    Article  Google Scholar 

  21. P. Juola, R.H. Baayen, A controlled-corpus experiment in authorship identification by cross-entropy. Lit. Ling. Comput. 20, 59–67 (2005)

    Article  Google Scholar 

  22. O. Canales, V. Monaco, T. Murphy, E. Zych, J. Stewart, C.T.A. Castro, O. Sotoye, L. Torres, G. Truley, A stylometry system for authenticating students taking online tests, (2011)

    Google Scholar 

  23. X. Chen, P. Hao, R. Chandramouli, K.P. Subbalakshmi, Authorship similarity detection from email messages, in Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, Berlin, (2011)

    Google Scholar 

  24. P. Juola, E. Stamatatos, Overview of the author identification task at PAN 2013, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013)

    Google Scholar 

  25. S. Seidman, Authorship verification using the impostors method, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013)

    Google Scholar 

  26. M. L. Brocardo, I. Traore, S. Saad and I. Woungang, Authorship verification for short messages using stylometry, in Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2013

    Google Scholar 

  27. M.L. Brocardo, I. Traore, I.Woungang, M.S. Obaidat, Authorship verification using deep belief network systems. Int. J. Commun. Syst. e3259–n/a 2017

    Google Scholar 

  28. B. Kjell, W.A. Woods, O. Frieder, Discrimination of authorship using visualization. Inf. Process. Manag. 30, 141–150 (1994)

    Article  Google Scholar 

  29. S.M. Alzahrani, N. Salim, A. Abraham, Understanding plagiarism linguistic patterns, textual features, and detection methods, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 42, 133–149, (2012)

    Article  Google Scholar 

  30. E. Stamatatos, A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538–556 (2009)

    Article  Google Scholar 

  31. J.F. Burrows, Word patterns and story shapes: the statistical analysis of narrative style. Lit. Ling. Comput. 2, 61–70 (1987)

    Article  Google Scholar 

  32. D.I. Holmes, The evolution of stylometry in humanities scholarship. Lit. Ling. Comput 13, 111–117 (1998)

    Article  Google Scholar 

  33. N. Homem, J.P. Carvalho, Authorship identification and author fuzzy Fingerprints, in Fuzzy Information Processing Society (NAFIPS), 2011 Annual Meeting of the North American, (2011)

    Google Scholar 

  34. F.J. Tweedie, R.H. Baayen, How variable may a constant be? Measures of lexical richness in perspective. Comput. Hum. 32, 323–352 (1998)

    Article  Google Scholar 

  35. O.D. Vel, A. Anderson, M. Corney, G. Mohay, Mining e-mail content for author identification forensics. Sigmod Record 30, 55–64 (2001)

    Article  Google Scholar 

  36. R. Zheng, J. Li, H. Chen, Z. Huang, A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 57(3), 378–393 (February 2006)

    Article  Google Scholar 

  37. A. Orebaugh, J. Allnutt, Classification of instant messaging communications for forensics analysis. Int. J. Forensic Comput. Sci. 1, 22–28 (2009)

    Article  Google Scholar 

  38. M. Koppel, J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the twenty-first international conference on Machine learning, (2004)

    Google Scholar 

  39. F. Peng, D. Schuurmans, S. Wang, V. Keselj, Language independent authorship attribution using character level language models, in Proceedings of the 10th Conference on European. Chapter of the Association for Computational Linguistics - Volume 1, Stroudsburg, (2003)

    Google Scholar 

  40. P. Juola, Authorship attribution for electronic documents, in Advances in digital forensics II, vol. 222, (Springer, New York, 2006), pp. 119–130

    Chapter  Google Scholar 

  41. H.V. Halteren, Author verification by linguistic profiling: an exploration of the parameter space. ACM Trans. Speech Lang. Process 4(1), 1–17 (February 2007)

    Article  Google Scholar 

  42. M.R. Brennan, R. Greenstadt, Practical attacks against authorship recognition techniques, in IAAI, (2009)

    Google Scholar 

  43. M.L. Brocardo, I. Traore, I. Woungang, Toward a framework for continuous authentication using stylometry, in The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, (2014)

    Google Scholar 

  44. H. Baayen, H. van Halteren, F. Tweedie, Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Lit. Ling. Comput. 11, 121–132 (1996)

    Article  Google Scholar 

  45. M. Koppel, J. Schler, Exploiting Stylistic Idiosyncrasies for Authorship Attribution, in IJCAI'03 Workshop on Computational Approaches to Style Analysis and Synthesis, Acapulco, (2003)

    Google Scholar 

  46. S. Argamon, S. Marin, S.S. Stein, Style mining of electronic messages for multiple authorship discrimination: first results, in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, (2003)

    Google Scholar 

  47. R. Hadjidj, M. Debbabi, H. Lounis, F. Iqbal, A. Szporer, D. Benredjem, Towards an integrated e-mail forensic analysis framework. Digit. Investig. 5, 124–137 (2009)

    Article  Google Scholar 

  48. A. Abbasi, H. Chen, Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 1–29 (April 2008)

    Article  Google Scholar 

  49. M.L. Brocardo, I. Traore, Continuous authentication using micro-,essages, in Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, 2014

    Google Scholar 

  50. B. Klimt, Y. Yang, The enron corpus: a new dataset for email classification research, in Machine learning: ECML 2004, (Springer, 2004), pp. 217–226

    Google Scholar 

  51. W.-W. Deng, H. Peng, Research on a Naive Bayesian Based short message filtering system, in Machine Learning and Cybernetics, 2006 International Conference on, (2006)

    Google Scholar 

  52. J. Cai, Y. Tang, R. Hu, Spam filter for short messages using winnow, in Advanced Language Processing and Web Information Technology, 2008. ALPIT'08. International Conference on, (2008)

    Google Scholar 

  53. M. Koppel, J. Schler, S. Argamon, Authorship attribution in the wild. Lang. Resour. Eval. 45(1), 83–94 (March 2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcelo Luiz Brocardo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Brocardo, M.L., Traore, I., Woungang, I. (2019). Continuous Authentication Using Writing Style. In: Obaidat, M., Traore, I., Woungang, I. (eds) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98734-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98734-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-98733-0

  • Online ISBN: 978-3-319-98734-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics