Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling

Biometrics could be used to suppress impersonation in e-learning systems and thus to improve credibility of exams taken at home. Mouse usage characteristics are cheap and widely accessible alternative to other forms of biometrics reaching promising results in identity verification task. The paper provides preliminary results of cheating detection method based on mouse usage data gathered in an e-learning system. Mouse path is analyzed in deeper by decomposition to arcs and straight segments in order to study single-intent moves and to reveal curve characteristics. The paper also describes preliminary results of predicting learning styles of students according to the characteristics of computer mouse usage patterns for further recommendation of suitable materials.

[1]  Lior Rokach,et al.  User identity verification via mouse dynamics , 2012, Inf. Sci..

[2]  Daniela Chudá,et al.  Multifactor authentication based on keystroke dynamics , 2009, CompSysTech '09.

[3]  P. Zimmermann,et al.  Affective Computing—A Rationale for Measuring Mood With Mouse and Keyboard , 2003, International journal of occupational safety and ergonomics : JOSE.

[4]  G. Ruxton The unequal variance t-test is an underused alternative to Student's t-test and the Mann–Whitney U test , 2006 .

[5]  Mark R. Freiermuth A Bridge to the Workplace: Using an Internet-Based Simulation in the Writing Classroom , 2005 .

[6]  Michael A. Crumpton,et al.  Assessing a Statewide Professional Development Effort , 2014 .

[7]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Robert M. Hierons,et al.  Measuring personality from keyboard and mouse use , 2008, ECCE '08.

[9]  Soumik Mondal,et al.  Continuous authentication using mouse dynamics , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[10]  Deron Liang,et al.  A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics , 2012, 2012 International Symposium on Biometrics and Security Technologies.

[11]  Mária Bieliková,et al.  ALEF: A Framework for Adaptive Web-Based Learning 2.0 , 2010, Key Competencies in the Knowledge Society.

[12]  Ernesto Arroyo,et al.  Usability tool for analysis of web designs using mouse tracks , 2006, CHI Extended Abstracts.

[13]  Yong Se Kim,et al.  Learning Styles Diagnosis Based on User Interface Behaviors for the Customization of Learning Interfaces in an Intelligent Tutoring System , 2006, Intelligent Tutoring Systems.

[14]  Tzu-Chien Hsiao,et al.  A Low-Cost Scalable Solution for Monitoring Affective State of Students in E-learning Environment Using Mouse and Keystroke Data , 2012, ITS.

[15]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[16]  Venkateswaran Shanmugapriya,et al.  Keystroke Dynamics Authentication Using Neural Network Approaches , 2010, ICT.

[17]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[18]  Andrew Sears,et al.  Automated stress detection using keystroke and linguistic features: An exploratory study , 2009, Int. J. Hum. Comput. Stud..

[19]  R. Felder,et al.  Applications, Reliability and Validity of the Index of Learning Styles* , 2005 .

[20]  Analía Amandi,et al.  Evaluating Bayesian networks' precision for detecting students' learning styles , 2007, Comput. Educ..

[21]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[22]  Thanh Phuong Nguyen,et al.  Decomposition of a Curve into Arcs and Line Segments Based on Dominant Point Detection , 2011, SCIA.

[23]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[24]  Tzu-Chien Liu,et al.  Identifying Learning Styles in Learning Management Systems by Using Indications from Students' Behaviour , 2008, 2008 Eighth IEEE International Conference on Advanced Learning Technologies.

[25]  Daniela Chudá,et al.  Usage of computer mouse characteristics for identification in web browsing , 2014, CompSysTech.

[26]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[27]  Ana L. N. Fred,et al.  A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.

[28]  Azad M. Madni,et al.  Leveraging Biometrics for User Authentication in Online Learning: A Systems Perspective , 2009, IEEE Systems Journal.

[29]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[30]  Pavel Zemliansky,et al.  Internet-based workplace communications: industry & academic applications , 2004 .

[31]  Regan L. Mandryk,et al.  Identifying emotional states using keystroke dynamics , 2011, CHI.

[32]  Miroslav Minovic,et al.  Educational Games and IT Professionals: Perspectives from the Field , 2012, Int. J. Hum. Cap. Inf. Technol. Prof..

[33]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[34]  R. Felder,et al.  Learning and Teaching Styles in Engineering Education. , 1988 .