Continuous Authentication for Mouse Dynamics a Pattern growth Approach 2012
Abstract
The aim of this work was to investigate existing algorithms for dynamic user authentication and develop our own, based on an analysis of computer mouse handling characterized by high-quality performance and a supporting dynamic mode. Existing ways of constructing and preliminarily processing the feature space are considered, along with means of dynamic authentication based on the use of classical techniques of machine learning and neural networks. Modifications with better efficiency are proposed for the ones most promising. A cross-platform application for dynamic user authentication based on an analysis of computer mouse handling is designed and implemented using the proposed technique, which shows the best performance (ROC AUC = 0.82). This system and its individual modules can serve as a basis for building advanced information security systems. Experimental studies are conducted that confirm the validity of the obtained results and the correctness of the system's operation.
REFERENCES
-
A. K. Jain, A. Ross, and S. Prabhakar, ''An introduction to biometric recognition,'' IEEE Trans. Circuits Syst. Video Technol. 14 (1), 4–20 (2004).
-
J. Wayman, A. Jain, D. Maltoni, and D. Maio, ''An introduction to biometric authentication systems,'' in Biometric Systems, Ed. by J. Wayman et al. (Springer, London, 2005), pp. 1–20.
-
Y. X. M. Tan, A. Binder, and A. Roy, ''Insights from curve fitting models in mouse dynamics authentication systems,'' in Proc. 2017 IEEE Conference on Application, Information and Network Security (AINS) (Miri, Malaysia, 2017), pp. 42–47.
-
A. A. Khalifa, M. A. Hassan et al., ''Comparison between mixed binary classification and voting technique for active user authentication using mouse dynamics,'' in Proc. 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE) (Khartoum, Sudan, 2015), pp. 281–286.
-
P. Chong, Y. Elovici, and A. Binder, ''User authentication based on mouse dynamics using deep neural networks: A comprehensive study,'' IEEE Trans. Inf. Forensics Secur. 15, 1086–1101 (2019).
-
P. Chong, Y. X. M. Tan et al., ''Mouse authentication without the temporal aspect – What does a 2D-CNN learn?'' in Proc. 2018 IEEE Security and Privacy Workshops (SPW 2018) (San Francisco, CA, 2018), pp. 15–21.
-
M. Antal and N. Fejér, ''Mouse dynamics based user recognition using deep learning,'' Acta Univ. Sapientiae, Inf. 12 (1), 39–50 (2020).
-
S. Mondal and P. Bours, ''A study on continuous authentication using a combination of keystroke and mouse biometrics,'' Neurocomputing 230, 1–22 (2017).
-
C. Feher, Y. Elovici et al., ''User identity verification via mouse dynamics,'' Inf. Sci.: Int. J. 201, 19–36 (2012).
-
J. H. Friedman, ''Greedy function approximation: A gradient boosting machine,'' Ann. Stat. 29 (5), 1189–1232 (2001).
-
M. Kazachuk, A. Kovalchuk, I. Mashechkin, I. Orpanen, M. Petrovskiy, I. Popov, and R. Zakliakov, ''One-class models for continuous authentication based on keystroke dynamics,'' in Intelligent Data Engineering and Automated Learning – IDEAL 2016, Proc. 17th Int. Conference, Ed. by H. Yin et al., Lecture Notes in Computer Science, Vol. 9937 (Springer, Cham, 2016), pp. 416–425.
-
M. M. Breunig, H.-P. Kriegel et al., ''LOF: identifying density-based local outliers,'' ACM SIGMOD Record 29 (2), 93–104 (2000).
-
F. T. Liu, K. M. Ting, and Z.-H. Zhou, ''Isolation forest,'' in Proc. Eighth IEEE International Conference on Data Mining (ICDM 2008) (Pisa, Italy, 2008), pp. 413–422.
-
B. Hoyle, M. M. Rau et al., ''Anomaly detection for machine learning redshifts applied to SDSS galaxies,'' Mon. Not. R. Astron. Soc. 452 (4), 4183–4194 (2015).
-
M. Antal and L. Denes-Fazakas, ''User verification based on mouse dynamics: A comparison of public data sets,'' in Proc. 2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI) (Timisoara, Romania, 2019), pp. 143–148.
-
C. Shen, Z. Cai, and X. Guan, ''Continuous authentication for mouse dynamics: A pattern-growth approach,'' in Proc. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (Boston, MA, 2012), pp. 1–12.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Translated by O. Pismenov
About this article
Cite this article
Berezniker, A.V., Kazachuk, M.A., Mashechkin, I.V. et al. User Behavior Authentication Based on Computer Mouse Dynamics. MoscowUniv.Comput.Math.Cybern. 45, 135–147 (2021). https://doi.org/10.3103/S027864192104004X
-
Received:
-
Revised:
-
Accepted:
-
Published:
-
Issue Date:
-
DOI : https://doi.org/10.3103/S027864192104004X
Keywords:
- dynamic authentication
- biometrics
- single-class classification
- gradient boosting
- dynamic local outlier removal
- single-class support vector technique
- neural networks
- dynamic trust level change
radfordablemplaid.blogspot.com
Source: https://link.springer.com/article/10.3103/S027864192104004X
0 Response to "Continuous Authentication for Mouse Dynamics a Pattern growth Approach 2012"
Postar um comentário