IDEAS home Printed from https://ideas.repec.org/a/das/njaigs/v8y2025i02p53-64id386.html
   My bibliography  Save this article

Behaviour Biometrics Using AI for Continuous Authentication Systems

Author

Listed:
  • Umair Ejaz
  • Farheen Iqbal
  • S A Mohaiminul Islam
  • Aidar Imashev

Abstract

Behaviour-based continuous authentication systems like those that utilise an individual user's typing rhythm and device usage behaviour patterns have much potential over password-based schemes since they do not require an individual user to memorise passwords. Irrespective of the progress in biometric technologies, many systems are still susceptible to more complex attacks, and the decision between security and usability has been a perennial struggle for researchers and practitioners. This paper offers a powerful continuous authentication system based on AI and behavioural biometrics, enhancing precision and resistance to motivated attacks. By measuring behavioural data (e.g. keystroke dynamics and motion sensor) on a heterogeneous user population and then analyzing it, we trained our machine learning models to verify users in real-time. Based on our results, our performance is better than that of the traditional and static authentication methods, with an accuracy of 97.2 per cent, with the false acceptance rate (FAR) and false rejection rate (FRR) of 1.8 per cent and 2.3 per cent, respectively. Moreover, error analysis depicted significant trends in behaviour changes, which apply to an adaptive security strategy. This is demonstrated as a potential of AI-based behavioural biometrics to support feasible, secure, and user-friendly continuous authentication systems that work in contemporary cybersecurity scenarios. Future improvements will additionally involve enlarging datasets, combining multi-modal behavioural features, and increasing resistance to spoofing and behavioural drift.

Suggested Citation

  • Umair Ejaz & Farheen Iqbal & S A Mohaiminul Islam & Aidar Imashev, 2025. "Behaviour Biometrics Using AI for Continuous Authentication Systems," Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023, Open Knowledge, vol. 8(02), pages 53-64.
  • Handle: RePEc:das:njaigs:v:8:y:2025:i:02:p:53-64:id:386
    as

    Download full text from publisher

    File URL: https://newjaigs.com/index.php/JAIGS/article/view/386
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:das:njaigs:v:8:y:2025:i:02:p:53-64:id:386. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Open Knowledge (email available below). General contact details of provider: https://newjaigs.com/index.php/JAIGS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.