{"id":"https://openalex.org/W4293093716","doi":"https://doi.org/10.1109/pst55820.2022.9851969","title":"LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach","display_name":"LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach","publication_year":2022,"publication_date":"2022-08-22","ids":{"openalex":"https://openalex.org/W4293093716","doi":"https://doi.org/10.1109/pst55820.2022.9851969"},"language":"en","primary_location":{"id":"doi:10.1109/pst55820.2022.9851969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst55820.2022.9851969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 19th Annual International Conference on Privacy, Security &amp; Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082446809","display_name":"Mingchang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Mingchang Liu","raw_affiliation_strings":["National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077"],"affiliations":[{"raw_affiliation_string":"National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008912765","display_name":"Vinay Sachidananda","orcid":"https://orcid.org/0000-0001-9582-1538"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vinay Sachidananda","raw_affiliation_strings":["National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077"],"affiliations":[{"raw_affiliation_string":"National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083082430","display_name":"Hongyi Peng","orcid":"https://orcid.org/0000-0002-2720-2628"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hongyi Peng","raw_affiliation_strings":["National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077"],"affiliations":[{"raw_affiliation_string":"National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067429244","display_name":"Rajendra Patil","orcid":"https://orcid.org/0000-0003-0479-6766"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Rajendra Patil","raw_affiliation_strings":["National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077"],"affiliations":[{"raw_affiliation_string":"National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003483897","display_name":"Sivaanandh Muneeswaran","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Sivaanandh Muneeswaran","raw_affiliation_strings":["National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077"],"affiliations":[{"raw_affiliation_string":"National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080394785","display_name":"Mohan Gurusamy","orcid":"https://orcid.org/0000-0001-6764-268X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mohan Gurusamy","raw_affiliation_strings":["National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077"],"affiliations":[{"raw_affiliation_string":"National University of Singapore,School of Computing, and Electrical and Computer Engineering,Singapore,119077","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5082446809"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.9097,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79523254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8339192867279053},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.7809528708457947},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.7374491095542908},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6040880680084229},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.490013986825943},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.41953137516975403},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4124116003513336},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29013872146606445}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8339192867279053},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.7809528708457947},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.7374491095542908},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6040880680084229},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.490013986825943},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.41953137516975403},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4124116003513336},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29013872146606445},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst55820.2022.9851969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst55820.2022.9851969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 19th Annual International Conference on Privacy, Security &amp; Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W4240977217","https://openalex.org/W3036524962","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239","https://openalex.org/W2279908259","https://openalex.org/W2025641871","https://openalex.org/W4252107351"],"abstract_inverted_index":{"Password-based":[0],"authentication":[1,74,100,144,195],"system":[2],"has":[3,34,199],"been":[4],"praised":[5],"for":[6,23,194,210],"its":[7],"user-friendly,":[8],"cost-effective,":[9],"and":[10,27,53,63,167,170,186,205,221],"easily":[11],"deployable":[12],"features.":[13],"It":[14],"is":[15,89,105,229],"arguably":[16],"the":[17,30,126,129,142,161,178],"most":[18],"commonly":[19],"used":[20],"security":[21,36],"mechanism":[22],"various":[24],"resources,":[25],"services,":[26],"applications.":[28],"On":[29],"other":[31],"hand,":[32],"it":[33,117,208,215],"well-known":[35],"flaws,":[37],"including":[38],"vulnerability":[39],"to":[40,159,182],"guessing":[41],"attacks.":[42],"Present":[43],"state-of-the-art":[44],"approaches":[45],"have":[46],"high":[47,65],"overheads,":[48],"as":[49,51,226],"well":[50],"difficulties":[52],"unreliability":[54],"during":[55],"training,":[56],"resulting":[57],"in":[58,114],"a":[59,64,70,72,84,98,106,121,133,172,200],"poor":[60],"user":[61,135,162,180,184],"experience":[62],"false":[66,86,202],"positive":[67,87,203],"rate.":[68],"As":[69],"result,":[71],"lightweight":[73,107],"compromise":[75,101,196],"detection":[76,82,102,225],"model":[77,108,160],"that":[78,109,128],"can":[79,110,216],"make":[80,222],"accurate":[81,224],"with":[83,219],"low":[85,201],"rate":[88,204],"required.In":[90],"this":[91],"paper":[92],"we":[93,140],"propose":[94],"\u2013":[95,97],"LOG-OFF":[96,104,175,198],"behavior-based":[99],"model.":[103],"be":[111],"deployed":[112],"efficiently":[113],"practice":[115],"because":[116],"does":[118,136],"not":[119,137],"include":[120],"labeled":[122],"dataset.":[123],"Based":[124],"on":[125],"assumption":[127],"behavioral":[130],"pattern":[131],"of":[132,190],"specific":[134],"suddenly":[138],"change,":[139],"study":[141],"real-world":[143,211],"traffic":[145],"data.":[146],"The":[147],"dataset":[148],"contains":[149],"more":[150,223,227],"than":[151],"4":[152],"million":[153],"records.":[154],"We":[155],"use":[156],"two":[157],"features":[158],"behaviors,":[163],"i.e.,":[164],"consecutive":[165],"failures":[166],"login":[168,192],"time,":[169],"develop":[171],"novel":[173],"approach.":[174],"learns":[176],"from":[177],"historical":[179],"behaviors":[181],"construct":[183],"profiles":[185],"makes":[187],"probabilistic":[188],"predictions":[189],"future":[191],"attempts":[193],"detection.":[197],"latency,":[206],"making":[207],"suitable":[209],"deployment.":[212],"In":[213],"addition,":[214],"also":[217],"evolve":[218],"time":[220],"data":[228],"being":[230],"collected.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
