Filters








487 Hits in 6.2 sec

Continuous Authentication using Mouse Dynamics

Soumik Mondal, Patrick Bours
2013 Biometrics and Electronic Signatures  
In this paper,w ed emonstrate an ew wayt op erform continuous authentication using Mouse Dynamics as the behavioural biometric modality.I nthe proposed scheme, the user will be authenticated per mouse  ...  In this research, we have used the mouse dynamics data of 49 users and evaluated the system performance with 6m achine learning algorithms.  ...  [ZPW11] used angle-based metrics of mouse movements for user verification. Theyh aveu sed 30 users (different ages, educational backgrounds, and occupations) and SVM as aclassification tool.  ... 
dblp:conf/biosig/MondalB13 fatcat:pzkmepdkhvgunmex2xlpfxheuu

A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication [chapter]

Nurul Afnan Mahadi, Mohamad Afendee Mohamed, Amirul Ihsan Mohamad, Mokhairi Makhtar, Mohd Fadzil Abdul Kadir, Mustafa Mamat
2018 Recent Advances in Cryptography and Network Security  
The objective is to determine the classifier techniques that mostly are used for data analysis during authentication process.  ...  In this paper, we investigate the current advances in the use of behavioral-based biometrics for user authentication.  ...  The author used support vector machine (SVM) as a classifier, and data analysis was done using WEKA software tool.  ... 
doi:10.5772/intechopen.76685 fatcat:jjruusa7xrdvxancljizuv7kfi

An efficient user verification system via mouse movements

Nan Zheng, Aaron Paloski, Haining Wang
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
The key feature of our system lies in using much more fine-grained (point-bypoint) angle-based metrics of mouse movements for user verification.  ...  In addition to physiological biometrics, behavioral biometrics has proven very useful in authenticating a user.  ...  Acknowledgments We would like to thank Aaron Koehl, Steven Gianvecchio, and Xin Ruan for their invaluable assistance in data collection and technical support.  ... 
doi:10.1145/2046707.2046725 dblp:conf/ccs/ZhengPW11 fatcat:4kgy74y4czc5ngmjsxwldu7y5a

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder
2019 2019 International Joint Conference on Neural Networks (IJCNN)  
Mouse dynamics is a potential means of authenticating users.  ...  In contrast to previous work, we consider the attacks in a more realistic and challenging setting in which an attacker has access to recorded user data but does not have access to the authentication model  ...  The TWOS dataset consists of mouse dynamics data from 24 users, one of which was not considered because of its small sample size.  ... 
doi:10.1109/ijcnn.2019.8852414 dblp:conf/ijcnn/TanIHEB19 fatcat:vqa5wo25lfg2bgerrfm6fnocae

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Nyle Siddiqui, Rushit Dave, Mounika Vanamala, Naeem Seliya
2022 Machine Learning and Knowledge Extraction  
Mouse dynamics is the behavior of a user's mouse movements and is a biometric that has shown great promise for continuous authentication schemes.  ...  Two evaluation scenarios are considered: binary classifiers are used for user authentication, with the top performer being a 1-dimensional convolutional neural network (1D-CNN) with a peak average test  ...  to authenticate 32 users Use of eye movements requires more intrusive data • Our ANN strongly outperformed [37] in all aspects and evaluation metrics [37] • • Strong SVM and ANN results Uncommon extracted  ... 
doi:10.3390/make4020023 fatcat:o2jkqlen3bckljer2oknpculqi

User Authentication Through Mouse Dynamics

Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, R. A. Maxion
2013 IEEE Transactions on Information Forensics and Security  
This paper presents a simple and efficient user authentication approach based on a fixed mouse-operation task.  ...  As an emerging behavioral biometric, mouse dynamics aims to address the authentication problem by verifying computer users on the basis of their mouse operating styles.  ...  They built a classifier based on scaled Euclidean distance using data from both legitimate users and impostors.  ... 
doi:10.1109/tifs.2012.2223677 fatcat:diqfrt3cwva2rkntfgxsoy4lxm

Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn?

Penny Chong, Yi Xiang Marcus Tan, Juan Guarnizo, Yuval Elovici, Alexander Binder
2018 2018 IEEE Security and Privacy Workshops (SPW)  
Mouse dynamics as behavioral biometrics are under investigation for their effectiveness in computer security systems.  ...  While counterintuitive at first sight, it permits to profit from well-initialized lower-layer kernels obtained via transfer learning.  ...  Data Preprocessing The 2D-CNN approach requires to generate images of mouse movement sequences from raw mouse coordinates. We have explored 3 different ways to generate the mouse movement plots.  ... 
doi:10.1109/spw.2018.00011 dblp:conf/sp/ChongTGEB18 fatcat:xljls4unizga5gkb75hmwijr7e

User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion

Xiujuan Wang, Qianqian Zheng, Kangfeng Zheng, Tong Wu
2020 Security and Communication Networks  
The dataset used in this paper was collected under complete uncontrolled condition from some volunteers by using our data collection program.  ...  In order to improve the recognition rate of users with single behavioral feature and prevent impostors from restricting an input device to avoid detection, a dual-index user authentication method based  ...  are selected to classify mouse data and keyboard data in this paper, in which DT, RF, NB, One-Class SVM, and SVM are used as the control group.  ... 
doi:10.1155/2020/9282380 fatcat:qcg7gk5my5dq5eqtpazzifewga

Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication

Kyungroul Lee, Sun-Young Lee
2020 Entropy  
An accuracy of over 99% was achieved, which means that the proposed method almost completely classifies the mouse data input from the user and the mouse data generated by the defender.  ...  The objective of this study was to verify the feasibility of mouse data exposure by deriving features to improve the accuracy of a mouse data attack technique using machine learning models.  ...  To protect the mouse movement from being exposed by the attack technique, a defender has been proposed to prevent stealing the mouse data input from the actual user rather than preempting the mouse data  ... 
doi:10.3390/e22030355 pmid:33286129 pmcid:PMC7516828 fatcat:2ezmssol55avxkv6on5ttzdywq

Mouse Dynamics Behavioral Biometrics: A Survey [article]

Simon Khan, Daqing Hou
2022 arXiv   pre-print
Utilization of internet in everyday life has made us vulnerable in terms of privacy and security of our data and systems.  ...  In this paper, we survey the literature on mouse dynamics and widget interactions dated from 1897 to 2021.  ...  ACKNOWLEDGMENTS Simon Khan is also affiliated and funded by the US Air Force Research Lab (AFRL), Rome, NY.  ... 
arXiv:2208.09061v1 fatcat:3wxoowcb4vct5nhbkpmtjbrr4q

Layered Security Architecture for Masquerade Attack Detection [chapter]

Hamed Saljooghinejad, Wilson Naik Bhukya
2012 Lecture Notes in Computer Science  
Our approach generates feature vectors which contain the output gained from analysis across multiple layers such as Window Data, Mouse Data, Keyboard Data, Command Line Data, File Access Data and Authentication  ...  Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior.  ...  Here is a window event sample: Event Mouse Data(6featurs) In this category mouse-related user activities like mouse click, mouse right click, mouse movement, etc. were captured for every application  ... 
doi:10.1007/978-3-642-31540-4_19 fatcat:5dxljhd6qbfhroz3vgfog6tvp4

Proposing a Biometric Verification Method for Students Attendance using Mouse Movements

MIHAILESCU Marius Iulian, PAU Valentin Corneliu
2013 International Journal of Academic Research in Business and Social Sciences  
The biometric authentication checks a user based on its unique characteristics -who you are. Behavioral biometrics has proven very useful in authentication a user.  ...  The mouse dynamics has a unique pattern for movements.  ...  SVM Classifier Based on the mouse movement dynamics of the users, Support Vector Machines (SVMs) are used here as classifier with the purpose to differentiate them.  ... 
doi:10.6007/ijarbss/v3-i11/368 fatcat:tjsdxgjj2za6dnxqoyuho6ovh4

Mouse Dynamics as Continuous User Authentication Tool

2019 International journal of recent technology and engineering  
Mouse Dynamicsis method which is inexpensive and provide uniquecharacteristic to prevent unlocked workstations attacks tolock out unauthorized users from accessing the system.  ...  Behavior-based user authentication with pointing devices, such as touchpads or mice, has been obtaining attention.  ...  Feature Source: The source of features used to train and evaluate the classifiers within the study (Click: features were derived from mouse click actions; Move: features were extracted from mouse movement  ... 
doi:10.35940/ijrte.d4404.118419 fatcat:w3wio5nz2jgyxhusxtv3avcp74

User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes

Xiujuan Wang, Yutong Shi, Kangfeng Zheng, Yuyang Zhang, Weijie Hong, Siwei Cao
2022 Sensors  
SIURUA uses scene-irrelated features and user-related features for user identification. First, features are extracted based on keystroke data and mouse movement data.  ...  In order to improve user authentication accuracy based on keystroke dynamics and mouse dynamics in hybrid scenes and to consider the user operation changes in different scenes that aggravate user status  ...  [25] conducted a study on signing with a mouse. In 2007, Ahmed et al. [2] verified the feasibility of using mouse movement data to authenticate identity.  ... 
doi:10.3390/s22176627 pmid:36081085 pmcid:PMC9460698 fatcat:2ozyf7tcr5ejnggvlo5gdn7xeu

Poster

Chao Shen, Zhongmin Cai, Xiaohong Guan
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
Mouse dynamics is the process of verifying the identity of computer users on the basis of their mouse operating characteristics, which are derived from the movement and click events.  ...  Using procedural features such as speed and acceleration curves to more accurately characterize mouse activity, and adopting distance metrics to overcome the within-class variability, we achieved a promising  ...  Previous studies have favored using data from real-world environments.  ... 
doi:10.1145/2046707.2093510 fatcat:7l6qohlpuzd33bieyu43mscuoi
« Previous Showing results 1 — 15 out of 487 results