当前位置: X-MOL 学术IEEE Trans. Dependable Secure Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System
IEEE Transactions on Dependable and Secure Computing ( IF 7.0 ) Pub Date : 2020-03-01 , DOI: 10.1109/tdsc.2017.2771295
Chao Shen , Yufei Chen , Xiaohong Guan , Roy A. Maxion

Analyzing mouse-interaction behaviors for implicitly identifying computer users has received growing interest from security and biometric researchers. This study presents a simple but efficient active user authentication system by modeling mouse-interaction behavior, which is accurate and competent for future deployments. A pattern-growth-based mining method is proposed to extract frequent behavior segments, in obtaining a stable and discriminative representation of mouse-interaction behavior. Then procedural features are extracted to provide an accurate and fine-grained characterization of the behavior segments. A SVM-based decision procedure using one-class learning techniques is applied to the feature space for performing authentication. Analyses are conducted using data from around 1,526,400 mouse operations of 159 participants, and the authentication performance is evaluated across various application scenarios and tasks. Our experimental results show that characteristics from frequent behavior segments are more stable and discriminative than those from holistic behavior, and the system achieves a practically useful level of performance with FAR of 0.09 percent and FRR of 1 percent. Additional experiments on usability to sample length, reliability to application task, scalability to user size, robustness to mimic attack, and response to behavior change are provided to further explore the applicability. We also compare the proposed approach with the state-of-the-art approaches for the collected data.

中文翻译:

用于主动用户身份验证系统的基于模式增长的挖掘鼠标交互行为

分析鼠标交互行为以隐式识别计算机用户已引起安全和生物识别研究人员越来越多的兴趣。本研究通过对鼠标交互行为进行建模,提出了一个简单但有效的主动用户身份验证系统,该系统准确且适用于未来的部署。提出了一种基于模式增长的挖掘方法来提取频繁的行为片段,以获得稳定且有区别的鼠标交互行为表示。然后提取程序特征以提供行为段的准确和细粒度特征。将使用一类学习技术的基于 SVM 的决策过程应用于特征空间以执行身份验证。使用来自 159 名参与者的大约 1,526,400 次鼠标操作的数据进行分析,并且跨各种应用场景和任务评估认证性能。我们的实验结果表明,频繁行为片段的特征比整体行为的特征更稳定和更具辨别力,系统实现了实用的性能水平,FAR 为 0.09%,FRR 为 1%。提供了关于样本长度的可用性、应用任务的可靠性、用户规模的可扩展性、模仿攻击的鲁棒性以及对行为变化的响应的额外实验,以进一步探索适用性。我们还将所提出的方法与收集数据的最先进方法进行了比较。我们的实验结果表明,频繁行为片段的特征比整体行为的特征更稳定和更具辨别力,系统实现了实用的性能水平,FAR 为 0.09%,FRR 为 1%。提供了关于样本长度的可用性、应用任务的可靠性、用户规模的可扩展性、模仿攻击的鲁棒性以及对行为变化的响应的额外实验,以进一步探索适用性。我们还将所提出的方法与收集数据的最先进方法进行了比较。我们的实验结果表明,频繁行为片段的特征比整体行为的特征更稳定和更具辨别力,系统实现了实用的性能水平,FAR 为 0.09%,FRR 为 1%。提供了关于样本长度的可用性、应用任务的可靠性、用户规模的可扩展性、模仿攻击的鲁棒性以及对行为变化的响应的额外实验,以进一步探索适用性。我们还将所提出的方法与收集数据的最先进方法进行了比较。提供了用户规模的可扩展性、模拟攻击的鲁棒性以及对行为变化的响应,以进一步探索适用性。我们还将所提出的方法与收集数据的最先进方法进行了比较。提供了用户规模的可扩展性、模拟攻击的鲁棒性以及对行为变化的响应,以进一步探索适用性。我们还将所提出的方法与收集数据的最先进方法进行了比较。
更新日期:2020-03-01
down
wechat
bug