A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics

Mouse-dynamics-related schemes have been shown to be feasible for user authentication systems, however, the existing approaches are either intrusive or not prompt response. Preventing unauthorized accesses to critical digital assets, namely, data stored in the file management system, is one of the major objectives of user authentication. We therefore propose a non-intrusive approach capable of verifying a user having performed a few times of file-related operations via a mouse. To evaluate the effectiveness of the proposed approach, the mouse movement of the file-related operations in Explorer, which is the most common way to search, open, save, copy, and/or delete files in Windows environments, is used for authentication. The experimental results show that the proposed approach is feasible and has three advantages: 1) it is non-intrusive, 2) it authenticates users in a short period of time, and 3) the quantity of mouse dynamics used for authentication purpose is lightweight.

[1]  Václav Matyás,et al.  Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..

[2]  Shih-Wei Lin,et al.  Particle swarm optimization for parameter determination and feature selection of support vector machines , 2008, Expert Syst. Appl..

[3]  Masashi Sugiyama,et al.  Dimensionality Reduction of Multimodal Labeled Data by Local Fisher Discriminant Analysis , 2007, J. Mach. Learn. Res..

[4]  Zhongmin Cai,et al.  Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring , 2009, 2009 IEEE International Conference on Communications.

[5]  Sandeep Kumar,et al.  Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Masashi Sugiyama,et al.  Local Fisher discriminant analysis for supervised dimensionality reduction , 2006, ICML.

[7]  Eiji Okamoto,et al.  A User Identification System Using Signature Written with Mouse , 1998, ACISP.

[8]  Hsing-Kuo Kenneth Pao,et al.  Game Bot Detection Based on Avatar Trajectory , 2008, ICEC.

[9]  A. Thomson A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics , 2009 .

[10]  Steven Furnell,et al.  Biometrics: no silver bullets , 2005 .

[11]  Leo Breiman,et al.  Classification and Regression Trees , 1984 .

[12]  Issa Traoré,et al.  Inverse Biometrics for mouse Dynamics , 2008, Int. J. Pattern Recognit. Artif. Intell..

[13]  Hamid Jahankhani,et al.  A Survey of User Authentication Based on Mouse Dynamics , 2008 .

[14]  Denis V. Popel,et al.  BIOGLYPH: biometric identification in pervasive environments , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[15]  Pranav Shah,et al.  Mouse Movements Biometric Identification: A Feasibility Study , 2007 .

[16]  Hsing-Kuo Kenneth Pao,et al.  Game bot identification based on manifold learning , 2008, NETGAMES.

[17]  J. Tenenbaum,et al.  A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.

[18]  Peter W. McOwan,et al.  Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[19]  Kuo-Hao Tang,et al.  Dynamic Mouse Speed Scheme Design Based on Trajectory Analysis , 2007, HCI.

[20]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[21]  Ana L. N. Fred,et al.  A User Authentication Technic Using a~Web Interaction Monitoring System , 2003, IbPRIA.

[22]  Issa Traoré,et al.  Chapter 7 A Statistical Model for Biometric Verification , 2006 .

[23]  Carla E. Brodley,et al.  User re-authentication via mouse movements , 2004, VizSEC/DMSEC '04.