On the Improvements of Mouse Dynamics Based Continuous User Authentication

被引:1
作者
Durmaz, Hayri [1 ,2 ]
Keskinoz, Mehmet [3 ]
机构
[1] ASELSAN Inc, Dept Comp Engn, Ankara, Turkiye
[2] ITU Turkey, Ankara, Turkiye
[3] ITU Turkey, Fac Comp & Informat, Istanbul, Turkiye
来源
2023 IEEE 24TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE, IRI | 2023年
关键词
Behavioral biometrics; CNN; Resnet; Cybersecurity; Deep Learning;
D O I
10.1109/IRI58017.2023.00010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional authentication methods are vulnerable when users leave their devices unattended or if their credentials are compromised. In contrast, continuous authentication offers a perpetual strategy for user validation, ensuring that only authorized users access critical information throughout their entire usage. The problem of continuous authentication boils down to a binary classification task: determining whether the usage is legal or illegal. Deep learning presents a promising solution for this problem, although the use of convolutional neural networks (CNNs) in continuous authentication still has room for improvement. In this study, we employ residual learning to train and test a user authentication model. To further enhance the accuracy of the results, we implement a realistic augmentation method and employ a superior image mapping technique compared to existing literature. As a result, we achieve significantly more accurate results than those reported in the referenced studies. On average, our tests yield a False Accept Rate of 0.45 and a False Reject Rate of 0.34, which are 6.5 times better than the referenced studies. These findings demonstrate a substantial improvement in the usability and effectiveness of real-world cybersecurity applications.
引用
收藏
页码:13 / 19
页数:7
相关论文
共 27 条
[1]   A survey on continuous authentication methods in Internet of Things environment [J].
Al-Naji, Fatimah Hussain ;
Zagrouba, Rachid .
COMPUTER COMMUNICATIONS, 2020, 163 :109-133
[2]  
Aloysius N, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), P588, DOI 10.1109/ICCSP.2017.8286426
[3]  
[Anonymous], 2017, RESNET50 TORCHV MAIN
[4]  
[Anonymous], 2021, ImageNet
[5]  
[Anonymous], 2018, BAL MOUS CHALL DAT S
[6]  
[Anonymous], Handbook Of Research On Machine Learning Applications and Trends:Algorithms, Methods and Techniques - 2 Volumes | Guide books, DOI DOI 10.5555/1803899
[7]  
[Anonymous], 2022, NVIDIA NGC CATALOG
[8]  
[Anonymous], 2023, P 2012 42 ANN IEEE I, DOI [10.5555/2354410.2355184, DOI 10.5555/2354410.2355184]
[9]   Security, Privacy, and Usability in Continuous Authentication: A Survey [J].
Baig, Ahmed Fraz ;
Eskeland, Sigurd .
SENSORS, 2021, 21 (17)
[10]  
Chao Shen, 2010, 2010 IEEE International Conference on Information Theory and Information Security, P349, DOI 10.1109/ICITIS.2010.5689603