A new biometric technology based on mouse dynamics

被引:200
作者
Ahmed, Ahmed Awad E. [1 ]
Traore, Issa [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC V8P 5C2, Canada
关键词
biometrics; mouse dynamics; security monitoring; network security; human computer interaction;
D O I
10.1109/TDSC.2007.70207
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new form of behavioral biometrics based on mouse dynamics, 1 which can be used in different security applications. We develop a technique that can be used to model the behavioral characteristics from the captured data using artificial neural networks. In addition, we present an architecture and implementation for the detector, which cover all the phases of the biometric data flow including the detection process. Experimental data illustrating the experiments conducted to evaluate the accuracy of the proposed detection technique are presented and analyzed. Specifically, three series of experiments are conducted. The main experiment, in which 22 participants are involved, reproduces real operating conditions in computing systems by giving participants an individual choice of operating environments and applications; 284 hours of raw mouse data are collected over 998 sessions, with an average of 45 sessions per user. The two other experiments, involving seven participants, provided a basis for studying the confounding factors arising from the main experiment by fixing the environment variables. In the main experiment, the performance results presented using receiver operating characteristic (ROC) curves and a confusion matrix yield at the crossover point ( that is, the threshold set for an equal error rate) a false acceptance rate ( FAR) of 2.4649 percent and a false rejection rate (FRR) of 2.4614 percent.
引用
收藏
页码:165 / 179
页数:15
相关论文
共 17 条
  • [1] ANDERSON JP, 1980, COMPTUER SECURITY TH
  • [2] Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
  • [3] USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
    BROWN, M
    ROGERS, SJ
    [J]. INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06): : 999 - 1014
  • [4] CHAN A, P IEEE COMP INT C CG, P139
  • [5] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [6] HOCQUET S, P 8 ANN DOCT M HLTH
  • [7] IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES
    JOYCE, R
    GUPTA, G
    [J]. COMMUNICATIONS OF THE ACM, 1990, 33 (02) : 168 - 176
  • [8] FVC2000: Fingerprint verification competition
    Maio, D
    Maltoni, D
    Cappelli, R
    Wayman, JL
    Jain, AK
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (03) : 402 - 412
  • [9] Martin Robert A., 2000, Paludicola, V3, P1
  • [10] Toward reliable user authentication through biometrics
    Matyáš Jr., Václav
    Říha, Zdeněk
    [J]. IEEE Security and Privacy, 2003, 1 (03) : 45 - 49