Continuous Authentication of Mouse Dynamics Based on Decision Level Fusion

The demand for information security is growing with the changes of the times, and the authentication system is an important gateway to ensure information security. Password authentication is the most commonly used authentication method in modern network. However, because the password is easy to be cracked, we need to pay more attention to more authentication methods. In many authentications, the advantage of keystrokes and mouse authentication are more obvious; however, when researchers use mouse dynamics to authenticate, classifier training always require a large amount of data, and when the data is less, there may be inaccurate results. In this paper, a decision-level fusion method of the two classifiers is proposed, which reduces the strong dependence on data during training. In this method, the support vector machine optimized by genetic algorithm and k-nearest-neighbor algorithm are combined to get a lower error rate, which is lower than the error rate generated by the two methods alone.

[1]  Bernhard Schölkopf,et al.  Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.

[2]  Lior Rokach,et al.  User identity verification via mouse dynamics , 2012, Inf. Sci..

[3]  Christian Igel,et al.  Active learning with support vector machines , 2014, WIREs Data Mining Knowl. Discov..

[4]  Bidyut Baran Chaudhuri,et al.  A majority voting scheme for multiresolution recognition of handprinted numerals , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[5]  D.A. Schulz,et al.  Mouse Curve Biometrics , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[6]  Kaushik Roy,et al.  Continuous Authentication Using Mouse Clickstream Data Analysis , 2019, SpaCCS Workshops.

[7]  Wang Kaixin,et al.  A User Authentication and Identification Model Based on Mouse Dynamics , 2017, ICIE '17.

[8]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[9]  Chao Shen,et al.  Continuous authentication for mouse dynamics: A pattern-growth approach , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[10]  Dae-Ki Kang,et al.  Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics , 2017, Pattern Recognit..

[11]  Yuval Elovici,et al.  Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis , 2019, Comput. Secur..

[12]  Peter W. McOwan,et al.  Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[13]  Margit Antal,et al.  Intrusion Detection Using Mouse Dynamics , 2018, IET Biom..

[14]  Lei Yan,et al.  Gait and Posture Analysis Method Based on Genetic Algorithm and Support Vector Machines with Acceleration Data , 2016, J. Robotics Mechatronics.

[15]  Ruilian Hou,et al.  A USB flash disk viruses preventing technique based on filtering access , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[16]  Kevin Warwick,et al.  Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..

[17]  Shivani Hashiaa,et al.  ON USING MOUSE MOVEMENTS AS A BIOMETRIC , 2005 .

[18]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..