Affiliation:
1. Sapientia Hungarian University of Transylvania , Department of Mathematics–Informatics Tirgu Mures
2. Sapientia Hungarian University of Transylvania , Department of Electrical Engineering Tirgu Mures
Abstract
Abstract
Behavioural biometrics provides an extra layer of security for user authentication mechanisms. Among behavioural biometrics, mouse dynamics provides a non-intrusive layer of security. In this paper we propose a novel convolutional neural network for extracting the features from the time series of users’ mouse movements. The effect of two preprocessing methods on the performance of the proposed architecture were evaluated. Different training types of the model, namely transfer learning and training from scratch, were investigated. Results for both authentication and identification systems are reported. The Balabit public data set was used for performance evaluation, however for transfer learning we used the DFL data set. Comprehensive experimental evaluations suggest that our model performed better than other deep learning models. In addition, transfer learning contributed to the better performance of both identification and authentication systems.
Reference14 articles.
1. [1] A. A. E. Ahmed, I. Traore, A new biometric technology based on mouse dynamics, IEEE Transactions on Dependable and Secure Computing4, 3 (2007) 165–179. ⇒4110.1109/TDSC.2007.70207
2. [2] A. A. E. Ahmed, I. Traore, Dynamic sample size detection in continuous authentication using sequential sampling, In Proceedings of the 27th Annual Computer Security Applications Conference ACSAC ’11, pp. 169–176, New York, NY, USA, 2011. ACM. ⇒4110.1145/2076732.2076756
3. [3] M. Antal, L. Dénes-Fazakas, User verification based on mouse dynamics: a comparison of public data sets, In 2019 23th International Symposium on Applied Computational Intelligence and Informatics, pp. 143–147, May 2019. ⇒4410.1109/SACI46893.2019.9111596
4. [4] P. Chong, Y. Elovici, A. Binder, User authentication based on mouse dynamics using deep neural networks: A comprehensive study, IEEE Transactions on Information Forensics and Security, 15 (2020) 1086–1101. ⇒42, 4810.1109/TIFS.2019.2930429
5. [5] P. Chong, Y. X. M. Tan, J. Guarnizo, Y. Elovici, A. Binder, Mouse authentication without the temporal aspect – what does a 2d-cnn learn? In 2018 IEEE Security and Privacy Workshops (SPW), pp. 15–21, May 2018. ⇒42, 4810.1109/SPW.2018.00011
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献