Abstract
The reinforcement of traditional static authentication by performing continuous authentication (CA) while the system is being used ensures that the user is legitimate throughout the computer usage. Stylometry can be a good candidate for CA since writing style can be acquired in a nonintrusive way and also is a good indicator of authorship. In using stylometry, the authentication process consists of comparing sample writing of an individual against the model or profile associated with the identity claimed by that individual at login time (i.e., one-to-one identity matching). Effective CA requires reauthenticating the user over a short period of time, which equates using a short text. Analyzing short texts is challenging since decision-making occurs on a limited amount of available information. High accuracy and resilience to forgery are other key challenges faced by CA. In this chapter, we discuss the key research challenges faced in using stylometry for CA, and we introduce an approach to tackle some of those challenges. Different classification techniques are investigated and evaluated using different public datasets, yielding encouraging performance results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Available at http://www.cs.cmu.edu/∼enron/
- 2.
Available at http://www.uvic.ca/engineering/ece/isot/datasets/
References
A.A.E. Ahmed, I. Traore, Dynamic sample size detection in continuous authentication using sequential sampling, in Proceedings of the 27th Annual Computer Security Applications Conference, New York, NY, USA, (2011)
M.E. Crosby, C.S. Ikehara, Continuous identity authentication using multimodal physiological sensors 5404 (2004), pp. 393–400
I. Traore, A. A. E. Ahmed (eds.), Continuous authentication using biometrics: continuous authentication using biometrics: data, models, and metrics (IGI Global, 2012), p. 385
R.S. Gaines, W. Lisowski, S.J. Press, N. Shapiro, Authentication by keystroke timing: some preliminary results. No. RAND-R-2526-NSF. Rand Corp Santa Monica CA, (1980)
A.A.E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics. IEEE Trans. Depend. Sec. Comput. 4, 165–179 (2007)
M. Koppel J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the 21st International Conference on Machine Learning, Banff, (2004)
L. Ballard, F. Monrose, D. Lopresti, Biometric authentication revisited: understanding the impact of wolves in sheepś clothing, in Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, Berkeley, (2006)
T.C. Mendenhall, The characteristic curves of composition. Science ns-9, 237–246 (1887)
F. Mosteller, D.L. Wallace. Inference in an authorship problem: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers. Journal of the American Statistical Association 58(302), 275–309 (1963)
A. Abbasi, H. Chen, Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67–75 (2005)
F. Iqbal, R. Hadjidj, B.C.M. Fung, M. Debbabi, A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5, S42–S51 (2008)
F. Iqbal, L.A. Khan, B.C.M. Fung, M. Debbabi, E-mail authorship verification for forensic investigation, in Proceedings of the 2010 ACM Symposium on Applied Computing, New York, NY, USA, (2010)
F. Iqbal, H. Binsalleeh, B.C.M. Fung, M. Debbabi, A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231, 98–112 (2013)
C.E. Chaski, Who's at the keyboard: authorship attribution in digital evidence investigations. Int. J. Digit. Evid. 4, 1–13 (2005)
J. Burrows, Delta: a measure of stylistic difference and a guide to likely authorship. Lit. Ling. Comput. 17, 267–287 (2002)
E. Backer, P. van Kranenburg, On musical stylometry pattern recognition approach. Pattern Recogn. Lett. 26, 299–309 (2005)
Y. Zhao, J. Zobel, Searching with style: authorship attribution in classic literature, in Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, Darlinghurst, (2007)
R.A.G.K. Sarawgi, Y. Choi, Gender attribution: tracing stylometric evidence beyond topic and genre, in Proceedings of the 15th Conference on Computational Natural Language Learning, Stroudsburg, (2011)
N. Cheng, X. Chen, R. Chandramouli, K.P. Subbalakshmi, Gender identification from e-mails, in Computational Intelligence and Data Mining, 2009. CIDM '09. IEEE Symposium on, (2009)
N. Cheng, R. Chandramouli, K.P. Subbalakshmi, Author gender identification from text. Digit. Investig. 8, 78–88 (2011)
P. Juola, R.H. Baayen, A controlled-corpus experiment in authorship identification by cross-entropy. Lit. Ling. Comput. 20, 59–67 (2005)
O. Canales, V. Monaco, T. Murphy, E. Zych, J. Stewart, C.T.A. Castro, O. Sotoye, L. Torres, G. Truley, A stylometry system for authenticating students taking online tests, (2011)
X. Chen, P. Hao, R. Chandramouli, K.P. Subbalakshmi, Authorship similarity detection from email messages, in Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, Berlin, (2011)
P. Juola, E. Stamatatos, Overview of the author identification task at PAN 2013, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013)
S. Seidman, Authorship verification using the impostors method, in Conference and Labs of the Evaluation Forum - CLEF 2013, Valencia - Spain, (2013)
M. L. Brocardo, I. Traore, S. Saad and I. Woungang, Authorship verification for short messages using stylometry, in Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), 2013
M.L. Brocardo, I. Traore, I.Woungang, M.S. Obaidat, Authorship verification using deep belief network systems. Int. J. Commun. Syst. e3259–n/a 2017
B. Kjell, W.A. Woods, O. Frieder, Discrimination of authorship using visualization. Inf. Process. Manag. 30, 141–150 (1994)
S.M. Alzahrani, N. Salim, A. Abraham, Understanding plagiarism linguistic patterns, textual features, and detection methods, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 42, 133–149, (2012)
E. Stamatatos, A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538–556 (2009)
J.F. Burrows, Word patterns and story shapes: the statistical analysis of narrative style. Lit. Ling. Comput. 2, 61–70 (1987)
D.I. Holmes, The evolution of stylometry in humanities scholarship. Lit. Ling. Comput 13, 111–117 (1998)
N. Homem, J.P. Carvalho, Authorship identification and author fuzzy Fingerprints, in Fuzzy Information Processing Society (NAFIPS), 2011 Annual Meeting of the North American, (2011)
F.J. Tweedie, R.H. Baayen, How variable may a constant be? Measures of lexical richness in perspective. Comput. Hum. 32, 323–352 (1998)
O.D. Vel, A. Anderson, M. Corney, G. Mohay, Mining e-mail content for author identification forensics. Sigmod Record 30, 55–64 (2001)
R. Zheng, J. Li, H. Chen, Z. Huang, A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 57(3), 378–393 (February 2006)
A. Orebaugh, J. Allnutt, Classification of instant messaging communications for forensics analysis. Int. J. Forensic Comput. Sci. 1, 22–28 (2009)
M. Koppel, J. Schler, Authorship verification as a one-class classification problem, in Proceedings of the twenty-first international conference on Machine learning, (2004)
F. Peng, D. Schuurmans, S. Wang, V. Keselj, Language independent authorship attribution using character level language models, in Proceedings of the 10th Conference on European. Chapter of the Association for Computational Linguistics - Volume 1, Stroudsburg, (2003)
P. Juola, Authorship attribution for electronic documents, in Advances in digital forensics II, vol. 222, (Springer, New York, 2006), pp. 119–130
H.V. Halteren, Author verification by linguistic profiling: an exploration of the parameter space. ACM Trans. Speech Lang. Process 4(1), 1–17 (February 2007)
M.R. Brennan, R. Greenstadt, Practical attacks against authorship recognition techniques, in IAAI, (2009)
M.L. Brocardo, I. Traore, I. Woungang, Toward a framework for continuous authentication using stylometry, in The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, (2014)
H. Baayen, H. van Halteren, F. Tweedie, Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Lit. Ling. Comput. 11, 121–132 (1996)
M. Koppel, J. Schler, Exploiting Stylistic Idiosyncrasies for Authorship Attribution, in IJCAI'03 Workshop on Computational Approaches to Style Analysis and Synthesis, Acapulco, (2003)
S. Argamon, S. Marin, S.S. Stein, Style mining of electronic messages for multiple authorship discrimination: first results, in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, (2003)
R. Hadjidj, M. Debbabi, H. Lounis, F. Iqbal, A. Szporer, D. Benredjem, Towards an integrated e-mail forensic analysis framework. Digit. Investig. 5, 124–137 (2009)
A. Abbasi, H. Chen, Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 1–29 (April 2008)
M.L. Brocardo, I. Traore, Continuous authentication using micro-,essages, in Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, 2014
B. Klimt, Y. Yang, The enron corpus: a new dataset for email classification research, in Machine learning: ECML 2004, (Springer, 2004), pp. 217–226
W.-W. Deng, H. Peng, Research on a Naive Bayesian Based short message filtering system, in Machine Learning and Cybernetics, 2006 International Conference on, (2006)
J. Cai, Y. Tang, R. Hu, Spam filter for short messages using winnow, in Advanced Language Processing and Web Information Technology, 2008. ALPIT'08. International Conference on, (2008)
M. Koppel, J. Schler, S. Argamon, Authorship attribution in the wild. Lang. Resour. Eval. 45(1), 83–94 (March 2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Brocardo, M.L., Traore, I., Woungang, I. (2019). Continuous Authentication Using Writing Style. In: Obaidat, M., Traore, I., Woungang, I. (eds) Biometric-Based Physical and Cybersecurity Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-98734-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-98734-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98733-0
Online ISBN: 978-3-319-98734-7
eBook Packages: EngineeringEngineering (R0)