An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication

With the increasingly prominent problem of information security, the research on user trustworthy authentication technology becomes more and more important. Identification and authentication methods based on user’s biological behavior characteristics have attracted widespread attention due to their low cost and difficulty in imitation, which represented by mouse dynamics. This study proposed an improved method for time-frequency joint analysis of mouse behaviors for trustworthy authentication of website users. We collected the behavior data of the user’s natural mouse operation under real website environment, and analyzed the timing and spatial characteristics of the user’s mouse movements. Based on extracting the time-frequency joint distribution characteristics and spatial distribution characteristics of the temporal signals of the user’s mouse movements, we used the random forest algorithm to establish a user’s trustworthy authentication model. Mouse behavior data of five users during twenty-eight months had been used as a case study to explore the effectiveness of this method in user trustworthy authentication. The results of case analysis showed that, comparing to the original research, the method proposed in this study significantly improved the accuracy of the website user trustworthy authentication.

[1]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.

[2]  Zhongmin Cai,et al.  MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System , 2016, IEEE Transactions on Human-Machine Systems.

[3]  R. Jeberson Retna Raj,et al.  An Integrated Approach of Physical Biometric Authentication System , 2016 .

[4]  Elham Tabassi,et al.  Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Dae-Ki Kang,et al.  One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics , 2017, Applied Intelligence.

[6]  M. Zweig,et al.  Receiver-operating characteristic (ROC) plots: a fundamental evaluation tool in clinical medicine. , 1993, Clinical chemistry.

[7]  Chao Shen,et al.  Continuous authentication for mouse dynamics: A pattern-growth approach , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[8]  Howard Shrobe New Solutions for Cybersecurity , 2018 .

[9]  Issa Traoré,et al.  Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors With Separate Features , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[10]  Biao Wang,et al.  Measuring Network User Trust via Mouse Behavior Characteristics Under Different Emotions , 2019, HCI.

[11]  Mohammad Mannan,et al.  A Large-Scale Evaluation of High-Impact Password Strength Meters , 2015, TSEC.

[12]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[13]  Mohammad S. Obaidat,et al.  Biometric Authentication Using Mouse Gesture Dynamics , 2013, IEEE Systems Journal.

[14]  Lior Rokach,et al.  User identity verification via mouse dynamics , 2012, Inf. Sci..

[15]  Haining Wang,et al.  An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics , 2016, TSEC.