Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions

被引:0
作者
Kim, Jinwook [1 ]
Lee, Kyungroul [2 ]
Jeong, Hanjo [3 ]
机构
[1] Mokpo Natl Univ, Interdisciplinary Program Informat & Protect, Muan 58554, South Korea
[2] Mokpo Natl Univ, Dept Informat Secur Engn, Muan 58554, South Korea
[3] Mokpo Natl Univ, Dept Software Convergence Engn, Muan 58554, South Korea
来源
APPLIED SCIENCES-BASEL | 2025年 / 15卷 / 02期
关键词
image-based authentication; mouse data; SetCursorPos() function; generative adversarial network(GANs); machine learning;
D O I
10.3390/app15020977
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In online services, password-based authentication, a prevalent method for user verification, is inherently vulnerable to keyboard input data attacks. To mitigate these vulnerabilities, image-based authentication methods have been introduced. However, these approaches also face significant security challenges due to the potential exposure of mouse input data. To address these threats, a protective technique that leverages the SetCursorPos() function to generate artificial mouse input data has been developed, thereby concealing genuine user inputs. Nevertheless, adversaries employing advanced machine learning techniques can distinguish between authentic and synthetic mouse data, leaving the security of mouse input data insufficiently robust. This study proposes an enhanced countermeasure utilizing Generative Adversarial Networks (GANs) to produce synthetic mouse data that closely emulate real user input. This approach effectively reduces the efficacy of machine learning-based adversarial attacks. Furthermore, to counteract real-time threats, the proposed method dynamically generates synthetic data based on historical user mouse sequences and integrates it with real-time inputs. Experimental evaluations demonstrate that the proposed method reduces the classification accuracy of mouse input data by adversaries to approximately 62%, thereby validating its efficacy in strengthening the security of mouse data.
引用
收藏
页数:14
相关论文
共 21 条
  • [1] A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity
    Agrawal, Garima
    Kaur, Amardeep
    Myneni, Sowmya
    [J]. ELECTRONICS, 2024, 13 (02)
  • [2] Conklin A., 2004, PASSWORD BASED AUTHE, P10, DOI DOI 10.1109/HICSS.2004.1265412
  • [3] Dhamija R., 2000, P 9 USENIX SEC S, P44
  • [4] github, CTGAN GitHub
  • [5] Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
  • [6] A Survey on Generative Adversarial Networks: Variants, Applications, and Training
    Jabbar, Abdul
    Li, Xi
    Omar, Bourahla
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (08)
  • [7] Jongmun Jeong, 2016, [Journal of the Korea Institute Of Information and Communication Engineering, 한국정보통신학회논문지], V20, P2289, DOI 10.6109/jkiice.2016.20.12.2289
  • [8] Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication
    Lee, Kyungroul
    Lee, Sun-Young
    [J]. ENTROPY, 2020, 22 (03)
  • [9] Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication
    Lee, Kyungroul
    Esposito, Christian
    Lee, Sun-Young
    [J]. IEEE ACCESS, 2019, 7 : 177241 - 177253
  • [10] MSDN, About us