ABSTRACT
The idea of using one's behavior with a pointing device, such as a mouse or a touchpad, as a behavioral biometric for authentication purposes has gained increasing attention over the past decade. A number of interesting approaches based on the idea have emerged in the literature and promising experimental results have been reported; however, we argue that limitations in the past experimental evaluations of these approaches raise questions about their true effectiveness in a practical setting. In this paper, we review existing authentication approaches based on mouse dynamics and shed light on some important limitations regarding how the effectiveness of these approaches has been evaluated in the past. We present the results of several experiments that we conducted to illustrate our observations and suggest guidelines for evaluating future authentication approaches based on mouse dynamics. We also discuss a number of avenues for additional research that we believe are necessary to advance the state of the art in this area.
- A. A. E. Ahmed and I. Traore. Anomaly intrusion detection based on biometrics. In IEEE Workshop on Information Assurance and Security, pages 452--453, 2005.Google ScholarCross Ref
- A. A. E. Ahmed and I. Traore. A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing, 4(3):165--179, 2007. Google ScholarDigital Library
- P. Bours and C. J. Fullu. A login system using mouse dynamics. In Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 1072--1077, 2009. Google ScholarDigital Library
- H. Gamboa and A. Fred. An identity authentication system based on human computer interaction behaviour. In 3rd International Workshop on Pattern Recognition on Information Systems, pages 46--55, 2003.Google Scholar
- H. Gamboa and A. Fred. A behavioural biometric system based on human computer interaction. In SPIE 5404 - Biometric Technology for Human Identification, pages 381--392, Orlando, FL USA, 2004.Google Scholar
- H. Gamboa, A. L. N. Fred, and A. K. Jain. Webbiometrics: User verification via web interaction. In Proceedings of Biometrics Symposium, pages 1--6, 2007.Google ScholarCross Ref
- I. Guyon and A. Elisseeff. An introduction to variable and feature selection. The Journal of Machine Learning Research, 3:1157--1182, 2003. Google ScholarDigital Library
- S. Hashia, C. Pollett, and M. Stamp. On using mouse movements as a biometric. In Proceeding in the International Conference on Computer Science and its Applications, volume 1, 2005.Google Scholar
- F. Monrose and A. D. Rubin. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 1:351--359, 2000. Google ScholarDigital Library
- M. Pusara and C. E. Brodley. User re-authentication via mouse movements. In C. E. Brodley, P. Chan, R. Lippman, and W. Yurcik, editors, Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 29 October 2004, Washington DC, USA, pages 1--8. ACM, 2004. Google ScholarDigital Library
- R. J. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993. Google ScholarDigital Library
- K. Revett, H. Jahankhani, S. T. de Magalhes, and H. M. D. Santos. A survey of user authentication based on mouse dynamics. In Proceedings of 4th International Conference on Global E-Security, volume 12 of Communications in Computer and Information Science, pages 210--219, London, UK, June 2008. Springer Berlin Heidelberg.Google ScholarCross Ref
- A. Ross and A. Jain. Multimodal biometrics: An overview. In 12th European Signal Processing Conference, pages 1221--1224, Vienna, Austria, 2004.Google Scholar
- D. A. Schulz. Mouse curve biometrics. In Biometric Consortium Conference, 2006 Biometrics Symposium, pages 1--6, 2006.Google ScholarCross Ref
Index Terms
- On mouse dynamics as a behavioral biometric for authentication
Recommendations
Keystroke Biometric Systems for User Authentication
Keystroke biometrics (KB) authentication systems are a less popular form of access control, although they are gaining popularity. In recent years, keystroke biometric authentication has been an active area of research due to its low cost and ease of ...
Continuous Authentication Using Behavioral Biometrics
A continuous behaviometric authentication system is tested on 99 users over 10 weeks, focusing on keystroke dynamics, mouse movements, application usage, and the system footprint. In the process, a new trust model was created to enable continuous ...
User authentication method based on keystroke dynamics and mouse dynamics using HDA
AbstractBiometric authentication has advantages over traditional authentication based on passwords or pin number (PIN) in that it is based on the user's inherent characteristics which is not easily stolen or lost. Keystroke dynamics and mouse dynamics are ...
Comments