Mouse Authentication Without the Temporal Aspect – What Does a 2D-CNN Learn?

Mouse dynamics as behavioral biometrics are under investigation for their effectiveness in computer security systems. Previous state-of-the-art methods relied on heuristic feature engineering for the extraction of features. Our work addresses this issue by learning the features with a convolutional neural network (CNN), thereby eliminating the need for manual feature design. Contrary to time-series-based modeling approaches, we propose to use a two-dimensional CNN with images as inputs. While counterintuitive at first sight, it permits to profit from well-initialized lower-layer kernels obtained via transfer learning. We demonstrate our results on two public datasets, Balabit and TWOS, and compare against a 1D-CNN and a classical baseline relying on hand-crafted features, which are both outperformed. We show that a position-independent variant of the 2D-CNN loses little performance yet we learned that the trained classifier is very sensitive to simulated resolution shifts at test time. In a final step, we analyze and visualize the learned features on single test curves using layer-wise relevance propagation (LRP). This analysis reveals that the 2D-CNN uses curve information only sparsely, with a tendency to assign little relevance to straight segments and artifactual curve crossings.

[1]  Yoon Kim,et al.  Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.

[2]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[3]  Soumik Mondal,et al.  A computational approach to the continuous authentication biometric system , 2015, Inf. Sci..

[4]  Issa Traoré,et al.  Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors With Separate Features , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[5]  Alexander Binder,et al.  Evaluating the Visualization of What a Deep Neural Network Has Learned , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[6]  Ting Yu,et al.  On mouse dynamics as a behavioral biometric for authentication , 2011, ASIACCS '11.

[7]  Zhongmin Cai,et al.  On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[8]  Trevor Darrell,et al.  Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.

[9]  Eiji Okamoto,et al.  A User Identification System Using Signature Written with Mouse , 1998, ACISP.

[10]  Patrick Bours Continuous keystroke dynamics: A different perspective towards biometric evaluation , 2012, Inf. Secur. Tech. Rep..

[11]  Alexander Binder,et al.  On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.

[12]  Zhongmin Cai,et al.  Performance evaluation of anomaly-detection algorithms for mouse dynamics , 2014, Comput. Secur..

[13]  Mohammad S. Obaidat,et al.  Biometric Authentication Using Mouse Gesture Dynamics , 2013, IEEE Systems Journal.

[14]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[15]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[16]  Haining Wang,et al.  An efficient user verification system via mouse movements , 2011, CCS '11.

[17]  Alexander Binder,et al.  Insights from curve fitting models in mouse dynamics authentication systems , 2017, 2017 IEEE Conference on Application, Information and Network Security (AINS).

[18]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[19]  Alexander Binder,et al.  Explaining nonlinear classification decisions with deep Taylor decomposition , 2015, Pattern Recognit..

[20]  Lior Rokach,et al.  User identity verification via mouse dynamics , 2012, Inf. Sci..

[21]  Athul Harilal,et al.  TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition , 2017, MIST@CCS.

[22]  Soumik Mondal,et al.  A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.

[23]  James S. Okolica,et al.  User identification and authentication using multi-modal behavioral biometrics , 2014 .

[24]  Youtian Du,et al.  User Authentication Through Mouse Dynamics , 2013, IEEE Transactions on Information Forensics and Security.