Real-Time Behavioral Biometrics and Continuous Authentication Framework for Secure Financial Transaction Ecosystems

Authors

  • Satya Rajkumar Bongu Populus Financial Group, 300 E John W Carpenter Fwy Ste. 900, Irving, TX 75062, United States. , Post Graduate Program in Artificial Intelligence & Machine Learning: Business Applications from The University of Texas at Austin, 101 East 21st St., Austin, TX 78712, United States. Email: satya.bongu@ieee.org ; satyarajkumar.bongu@gmail.com , The University of Texas at Austin image/svg+xml Author

DOI:

https://doi.org/10.71426/jasm.v1.i1.pp40-50

Keywords:

Continuous authentication, Behavioral biometrics, Real-time identity verification, Financial transaction security, Anomaly detection, Risk-adaptive authentication.

Abstract

Digital financial platforms rely heavily on session-based authentication mechanisms that verify user identity only at discrete checkpoints, leaving systems vulnerable to post-login account takeover attacks. Continuous authentication based on behavioral biometrics has emerged as a promising solution for maintaining persistent identity assurance throughout active sessions. This work proposes a real-time behavioral biometric framework for continuous authentication using keystroke dynamics and sequential monitoring of interaction patterns. The proposed method models user-specific behavioral structure through reconstruction consistency in a low-dimensional subspace learned from enrollment data. Incoming interaction events are evaluated in real time using reconstruction error, and a sliding temporal window aggregates behavioral deviation to support stable decision making. User-specific thresholds derived from enrollment statistics enable adaptive sensitivity control, while takeover detection latency is explicitly quantified to assess operational security effectiveness. Experiments were conducted using the CMU Keystroke Dynamics benchmark under simulated session takeover scenarios. Performance was evaluated using verification metrics including false acceptance rate, false rejection rate, equal error rate, and temporal detection delay. Results demonstrate that the proposed framework achieves reliable identity discrimination while enabling rapid detection of behavioral takeover events with low latency and stable threshold behavior. The findings confirm that continuous behavioral monitoring can significantly reduce the exposure window of compromised sessions, even under unimodal biometric sensing. The proposed framework provides a computationally efficient and deployment-ready approach for strengthening real-time security in financial transaction ecosystems.

References

[1] Mahfouz A, Mahmoud TM, Eldin AS. A survey on behavioral biometric authentication on smartphones. Journal of Information Security and Applications. 2017 Oct 23;37:28–37. Available from: https://doi.org/10.1016/j.jisa.2017.10.002

[2] Meng W, Wong DS, Furnell S, Zhou J. Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials. 2014 Dec 31;17(3):1268–1293. Available from: https://ieeexplore.ieee.org/abstract/document/7000543

[3] Bours P, Mondal S. Continuous authentication with keystroke dynamics. Norwegian Information Security Laboratory NISlab. 2015 Jan 1:41–58. Available from: https://doi.org/10.15579/gcsr.vol2.ch3

[4] Mu N, Xu X, Zhang X. Finding autofocus region in low contrast surveillance images using CNN-based saliency algorithm. Pattern Recognition Letters. 2019 Apr 16;125:124–132. Available from: https://doi.org/10.1016/j.patrec.2019.04.011

[5] Finnegan OL, White JW, Armstrong B, Adams EL, Burkart S, Beets MW, et al. The utility of behavioral biometrics in user authentication and demographic characteristic detection: A scoping review. Systematic Reviews. 2024 Feb 8;13(1):61. Available from: https://doi.org/10.1186/s13643-024-02451-1

[6] Keselj A, Milicevic M, Zubrinic K, Car Z. The application of deep learning for the evaluation of user interfaces. Sensors. 2022 Nov 30;22(23):9336. Available from: https://doi.org/10.3390/s22239336

[7] Kim DH, Song BC. Virtual sample-based deep metric learning using discriminant analysis. Pattern Recognition. 2020 Sep 10;110:107643. Available from: https://doi.org/10.1016/j.patcog.2020.107643

[8] Teh PS, Teoh ABJ, Yue S. A survey of keystroke dynamics biometrics. The Scientific World Journal. 2013 Jan 1;2013(1):408280. Available from: https://doi.org/10.1155/2013/408280

[9] Dillon R, De Marsico M. Behavioral biometrics for remote exam integrity: Continuous authenticity assessment via keystroke dynamics. Procedia Computer Science. 2025 Jan 1;274:402–411. Available from: https://doi.org/10.1016/j.procs.2025.12.040

[10] Wang P, Chen B, Xiang T, Wang Z. Lattice-based public key searchable encryption with fine-grained access control for edge computing. Future Generation Computer Systems. 2021 Sep 21;127:373–383. Available from: https://doi.org/10.1016/j.future.2021.09.012

[11] Charan PVS, Ratnakaram G, Chunduri H, Anand PM, Shukla SK. DKaaS: DARK-KERNEL as a service for active cyber threat intelligence. Computers & Security. 2023 Jun 10;132:103329. Available from: https://doi.org/10.1016/j.cose.2023.103329

[12] Dintakurthy Y, Innmuri RK, Vanteru A, Thotakuri A. Emerging applications of artificial intelligence in edge computing: A comprehensive review. Journal of Modern Technology. 2024;175–185. Available from: https://doi.org/10.71426/jmt.v1.i2.pp175-185

[13] Oduri S. Continuous authentication and behavioral biometrics: Enhancing cybersecurity in the digital era. International Journal of Innovative Research in Science Engineering and Technology. 2024 Apr;13(7):13632–13640. Available from: https://doi.org/10.15680/IJIRSET.2024.1307140

[14] Zhou Y, Liang X, Zhang W, Zhang L, Song X. VAE-based deep SVDD for anomaly detection. Neurocomputing. 2021 Apr 29;453:131–140. Available from: https://doi.org/10.1016/j.neucom.2021.04.089

[15] Soma AK. Hybrid RNN-GRU-LSTM model for accurate detection of DDOS attacks on IDS dataset. Journal of Modern Technology. 2024 May 14;2(1):283–291. Available from: https://doi.org/10.71426/jmt.v2.i1.pp283-291

[16] Bansal P, Ouda A. Continuous authentication in the digital age: An analysis of reinforcement learning and behavioral biometrics. Computers. 2024 Apr 18;13(4):103. Available from: https://doi.org/10.3390/computers13040103

[17] Penaganti R. Technical implementation guide: Modern payment solutions for captive finance. Journal of Computer Science and Technology Studies. 2025 Nov 6;7(11):346–362. Available from: https://doi.org/10.32996/jcsts.2025.7.11.34

[18] Jain AK, Kumar A. Biometric recognition: An overview. In: The International Library of Ethics, Law and Technology. 2012. p. 49–79. Available from: https://doi.org/10.1007/978-94-007-3892-8_3

[19] Salem A, Obaidat MS. A novel security scheme for behavioral authentication systems based on keystroke dynamics. Security and Privacy. 2019 Feb 13;2(2). Available from: https://doi.org/10.1002/spy2.64

[20] Baig AF, Eskeland S, Yang B. Privacy-preserving continuous authentication using behavioral biometrics. International Journal of Information Security. 2023 Jul 13;22(6):1833–1847. Available from: https://doi.org/10.1007/s10207-023-00721-y

[21] Kang G, Park J, Kim YG. Continuous behavioral biometric authentication for secure metaverse workspaces in digital environments. Systems. 2025 Jul 15;13(7):588. Available from: https://doi.org/10.3390/systems13070588

[22] Belman AK, Wang L, Iyengar SS, Sniatala P, Wright R, Dora R, et al. Insights from BB-MAS: A large dataset for typing, gait and swipes of the same person on desktop, tablet and phone. arXiv. 2019 Nov 8. Available from: https://doi.org/10.48550/arXiv.1912.02736

[23] Dillon R, Arushi. Agent-based modeling of free-text keyboard dynamics for continuous authentication. arXiv. 2025. Available from: https://arxiv.org/abs/2505.05015

[24] Islam MM, Rafiq MA, Islam MA. A privacy-preserving behavioral authentication system. In: International Symposium on Foundations and Practice of Security. 2024 Dec 9;95–107. Available from: https://doi.org/10.1007/978-3-031-87496-3_7

[25] Subash A, Song I, Lee I, Lee K. Adaptability of current keystroke and mouse behavioral biometric systems: A survey. Computers & Security. 2025 Oct 21:104731. Available from: https://doi.org/10.1016/j.cose.2025.104731

[26] Saripudi K. Artificial intelligence and cloud computing assistance for enhancement of startup businesses. Journal of Computing and Data Technology. 2025 Jul 26;1(1):68–76. Available from: https://doi.org/10.71426/jcdt.v1.i1.pp68-76

[27] Rayani PK, Changder S. Continuous user authentication on smartphone via behavioral biometrics: A survey. Multimedia Tools and Applications. 2022 Jun 9;82(2):1633–1667. Available from: https://doi.org/10.1007/s11042-022-13245-9

[28] Penaganti R. AI-driven fraud detection in financial systems: A technical deep dive. Journal of Information Systems Engineering & Management. 2025 Sep 30;10(60s):1049–1069. Available from: https://doi.org/10.52783/jisem.v10i60s.13262

[29] Progonov D, Cherniakova V, Kolesnichenko P, Oliynyk A. Behavior-based user authentication on mobile devices in various usage contexts. EURASIP Journal on Information Security. 2022 Sep 16;2022(1):6. Available from: https://doi.org/10.1186/s13635-022-00132-x

Downloads

Issue

Section

Research Article

How to Cite

Real-Time Behavioral Biometrics and Continuous Authentication Framework for Secure Financial Transaction Ecosystems. (2025). Journal of Applied Sciences and Modelling, 1(1), 40-50. https://doi.org/10.71426/jasm.v1.i1.pp40-50