Behavioural Biometrics for Continuous Authentication in Cybersecurity Systems

Authors

  • Ashwin Tanmay Vaidya, Jatin Dinesh Mhatre Dept. of Computer Science and Engineering, Maharashtra Institute of Technology (MIT), Aurangabad, Maharashtra, India Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0804001

Keywords:

Behavioral Biometrics, Continuous Authentication, Cybersecurity, Keystroke Dynamics, Mouse Movement, Touch Gestures, Gait Analysis, Machine Learning, User Behavior, Identity Theft, Insider Threats

Abstract

Behavioral biometrics is an emerging field in cybersecurity that leverages unique patterns of human behavior to continuously authenticate individuals in real-time. Unlike traditional biometrics, such as fingerprints or facial recognition, which are typically used at the point of access, behavioral biometrics continuously monitor and analyze how users interact with devices, systems, and applications. This dynamic approach offers enhanced security by detecting anomalous behaviors that may indicate unauthorized access or suspicious activity, without disrupting the user experience. This paper explores the role of behavioral biometrics in continuous authentication systems, discussing various modalities such as keystroke dynamics, mouse movement, touch gestures, and gait analysis. It examines the advantages and limitations of these methods, with a focus on their effectiveness in preventing identity theft, session hijacking, and insider threats. The paper also delves into the integration of machine learning algorithms in behavioral biometrics, which enable systems to adapt to evolving user behaviors and enhance the accuracy of detection.We also address the challenges associated with implementing continuous authentication systems, including privacy concerns, data security, and the computational overhead of processing behavioral data in real-time. Furthermore, we explore future research directions, including multi-modal authentication, cross-platform integration, and the potential impact of artificial intelligence in refining behavioral biometric models.In conclusion, behavioral biometrics holds great promise in enhancing cybersecurity by providing a seamless, non-intrusive layer of continuous authentication. The integration of behavioral patterns into cybersecurity systems could significantly improve defense mechanisms against unauthorized access and improve user experience by reducing reliance on traditional authentication methods.

References

1. Jain, A. K., Ross, A., & Nandakumar, KIntroduction to Biometrics. Springer.

2. Sahoo, S. K., & Chandra, S. "Continuous Authentication Using Behavioral Biometrics." Journal of Cyber Security and Mobility, 9(3), 185-198.

3. Suman, A., & Verma, P. "A Survey on Behavioral Biometrics for Authentication." International Journal of Computer Applications, 169(4), 1-7.

4. Venu Madhav Aragani, Venkateswara Rao Anumolu, P. Selvakumar, “Democratization in the Age of Algorithms: Navigating Opportunities and Challenges,” in Democracy and Democratization in the Age of AI, IGI Global, USA,

pp. 39-56, 2025.

5. Chen, X., & Zhang, D("Keystroke Dynamics as a Continuous Authentication Tool." Proceedings of the 2022 IEEE International Conference on Computer Science and Software Engineering, 72-80.

Downloads

Published

2025-07-01

How to Cite

Behavioural Biometrics for Continuous Authentication in Cybersecurity Systems. (2025). International Journal of Computer Technology and Electronics Communication, 8(4), 11007-11012. https://doi.org/10.15680/IJCTECE.2025.0804001