A comparative study of Mouse and Keystroke Based Authentication

被引:0
作者
Handa, Jigyasa [1 ]
Singh, Saurabh [1 ]
Saraswat, Shipra [1 ]
机构
[1] Amity Univ, Dept CSE, Noida, India
来源
2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019) | 2019年
关键词
Biometrics; network security; mouse dynamics; keystroke dynamics; USER IDENTIFICATION;
D O I
10.1109/confluence.2019.8776953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the basic behavioural biometric methods is keystroke element. Being less expensive and not requiring any extra bit of equipment is the main advantage of keystroke element. The primary concentration of this paper is to give an inevitable review of behavioural biometrics strategies, measurements and different methodologies and difficulties and future bearings specially of keystroke analysis and mouse dynamics. Keystrokes elements frameworks utilize insights, e.g. time between keystrokes, word decisions, word mixes, general speed of writing and so on. Mouse Dynamics is termed as the course of actions captured from the moving mouse by an individual when interacting with a GUI. These are representative factors which may be called mouse dynamics signature of an individual, and may be used for verification of identity of an individual. In this paper, we compare the authentication system based on keystroke dynamics and mouse dynamics.
引用
收藏
页码:670 / 674
页数:5
相关论文
共 12 条
  • [1] [Anonymous], 2007, P STUD FAC RES DAY C
  • [2] [Anonymous], 1977, RADCTR77333
  • [3] Biometric Authentication and Identification using Keystroke Dynamics: A Survey
    Banerjee, Salil P.
    Woodard, Damon L.
    [J]. JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01): : 116 - 139
  • [4] Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
  • [5] USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
    BROWN, M
    ROGERS, SJ
    [J]. INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06): : 999 - 1014
  • [6] Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications
    Hosseinzadeh, Danoush
    Krishnan, Sridhar
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2008, 38 (06): : 816 - 826
  • [7] Intrusion and intrusion detection
    John McHugh
    [J]. International Journal of Information Security, 2001, 1 (1) : 14 - 35
  • [8] Pusara Maja., 2007, EXAMINATION USER BEH
  • [9] User Authentication with Keystroke Dynamics using Fixed Text
    Rybnik, Mariusz
    Panasiuk, Piotr
    Saeed, Khalid
    [J]. ICBAKE: 2009 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING, 2009, : 70 - +
  • [10] Villani M., 2006, P 2006 C COMPUTER VI, P39, DOI DOI 10.1109/CVPRW.2006.115