Skip to main content
Erschienen in: Journal of Intelligent Information Systems 3/2018

07.02.2018

Recognition of web users with the aid of biometric user model

verfasst von: Peter Krátky, Daniela Chudá

Erschienen in: Journal of Intelligent Information Systems | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Methods aimed at recognition of users are able to identify browsers or machines, but cannot distinguish physical persons. Multiple identities of single users are common on the Internet and this phenomenon decreases trustfulness of presented content as well as quality of provided services. This paper proposes a novel method for recognition of persons on the Web using input device usage patterns (keyboard, computer mouse, touchscreen), behavioral biometrics. The essential part of this method is a biometric component attached to the user model of an information system serving as a biometric identifier. The recognition of users relies in matching these components, specifically comparing values distribution shapes, which are characterizing users. The paper presents results of the method performance, which were obtained in a series of experiments focused on different aspects of evaluation (recognition rate, scalability, etc.). More specifically, a conducted case study shows application of the method to solve an issue in website visits analysis caused by erasing cookies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Brusilovsky, P., & Millán, E. (2007). The adaptive web. chap. User Models for Adaptive Hypermedia and Adaptive Educational Systems, pp. 3–53. Berlin: Springer-Verlag. Brusilovsky, P., & Millán, E. (2007). The adaptive web. chap. User Models for Adaptive Hypermedia and Adaptive Educational Systems, pp. 3–53. Berlin: Springer-Verlag.
Zurück zum Zitat Burda, K., & Chuda, D. (2018). Influence of body postures on touch-based biometric user authentication. In Tjoa, A.M., Bellatreche, L., Biffl, S., van Leeuwen, J., & Wiedermann, J. (Eds.) SOFSEM 2018: Theory and Practice of Computer Science, pp. 459–468. Springer International Publishing. Burda, K., & Chuda, D. (2018). Influence of body postures on touch-based biometric user authentication. In Tjoa, A.M., Bellatreche, L., Biffl, S., van Leeuwen, J., & Wiedermann, J. (Eds.) SOFSEM 2018: Theory and Practice of Computer Science, pp. 459–468. Springer International Publishing.
Zurück zum Zitat Cha, S.H. (2007). Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions. International Journal of Mathematical Models and Methods in Applied Sciences, 1(4), 300–307. Cha, S.H. (2007). Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions. International Journal of Mathematical Models and Methods in Applied Sciences, 1(4), 300–307.
Zurück zum Zitat Chen, M.C., Anderson, J.R., & Sohn, M.H. (2001). What can a mouse cursor tell us more?: Correlation of eye/mouse movements on web browsing. In CHI ’01 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’01, pp. 281–282. ACM, New York, NY, USA. https://doi.org/10.1145/634067.634234. Chen, M.C., Anderson, J.R., & Sohn, M.H. (2001). What can a mouse cursor tell us more?: Correlation of eye/mouse movements on web browsing. In CHI ’01 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’01, pp. 281–282. ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​634067.​634234.
Zurück zum Zitat Chudȧ, D., & Krȧtky, P. (2014). Usage of computer mouse characteristics for identification in web browsing. In Proceedings of the 15th International Conference on Computer Systems and Technologies - CompSysTech ’14, pp. 218–225. ACM Press, New York, New York. USA. https://doi.org/10.1145/2659532.2659645. Chudȧ, D., & Krȧtky, P. (2014). Usage of computer mouse characteristics for identification in web browsing. In Proceedings of the 15th International Conference on Computer Systems and Technologies - CompSysTech ’14, pp. 218–225. ACM Press, New York, New York. USA. https://​doi.​org/​10.​1145/​2659532.​2659645.
Zurück zum Zitat Chudȧ, D., & Krȧtky, P. (2015). Grouping Instances in kNN for Classification Based on Computer Mouse Features. In Proceedings of the 16th International Conference on Computer Systems and Technologies, pp. 214–220. ACM. Chudȧ, D., & Krȧtky, P. (2015). Grouping Instances in kNN for Classification Based on Computer Mouse Features. In Proceedings of the 16th International Conference on Computer Systems and Technologies, pp. 214–220. ACM.
Zurück zum Zitat De Luca, A., Hang, A., Brudy, F., Lindner, C., & Hussmann, H. (2012). Touch me once and i know it’s you!: Implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, pp. 987–996. ACM, New York, NY. USA. https://doi.org/10.1145/2207676.2208544. De Luca, A., Hang, A., Brudy, F., Lindner, C., & Hussmann, H. (2012). Touch me once and i know it’s you!: Implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, pp. 987–996. ACM, New York, NY. USA. https://​doi.​org/​10.​1145/​2207676.​2208544.
Zurück zum Zitat Fairhurst, M., & Costa-Abreu, M.D. (2011). Using keystroke dynamics for gender identification in social network environment. In 4th International Conference on Imaging for Crime Detection and Prevention 2011 (ICDP 2011), pp. 1–6. https://doi.org/10.1049/ic.2011.0124. Fairhurst, M., & Costa-Abreu, M.D. (2011). Using keystroke dynamics for gender identification in social network environment. In 4th International Conference on Imaging for Crime Detection and Prevention 2011 (ICDP 2011), pp. 1–6. https://​doi.​org/​10.​1049/​ic.​2011.​0124.
Zurück zum Zitat Gaines, R., Lisowski, W., Press, S., & Shapiro, N. (1980). Authentication by keystroke timing: some preliminary results. Tech. rep.: RAND Corporation. Gaines, R., Lisowski, W., Press, S., & Shapiro, N. (1980). Authentication by keystroke timing: some preliminary results. Tech. rep.: RAND Corporation.
Zurück zum Zitat Hashiaa, S., Pollettb, C., Stampc, M., Hall, M.Q., Hashia, S., Pollett, C., Stamp, M., & Jose, S. (2005). On Using Mouse Movements As a Biometric. In Proceedings of the International Conference on Computer Science and its Applications, vol. 1. Hashiaa, S., Pollettb, C., Stampc, M., Hall, M.Q., Hashia, S., Pollett, C., Stamp, M., & Jose, S. (2005). On Using Mouse Movements As a Biometric. In Proceedings of the International Conference on Computer Science and its Applications, vol. 1.
Zurück zum Zitat Hogben, G. (2010). ENISA Briefing : Behavioural Biometrics. ENISA: Tech. rep. Hogben, G. (2010). ENISA Briefing : Behavioural Biometrics. ENISA: Tech. rep.
Zurück zum Zitat Kelly, D., & Belkin, N.J. (2004). Display time as implicit feedback: Understanding task effects. In Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’04, pp. 377–384. ACM, New York, NY. USA. https://doi.org/10.1145/1008992.1009057. Kelly, D., & Belkin, N.J. (2004). Display time as implicit feedback: Understanding task effects. In Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’04, pp. 377–384. ACM, New York, NY. USA. https://​doi.​org/​10.​1145/​1008992.​1009057.
Zurück zum Zitat Krȧtky, P., & Chudȧ, D. (2016). Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse. In WWW 2016 Companion, pp. 61–62. ACM. Krȧtky, P., & Chudȧ, D. (2016). Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse. In WWW 2016 Companion, pp. 61–62. ACM.
Zurück zum Zitat Krȧtky, P., & Chudȧ, D. (2016). Fine-tuning web traffic statistics by deduplication and splitting of visitors records using mouse biometrics. In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, CompSysTech ’16, pp. 300–306. ACM, New York, NY. USA. https://doi.org/10.1145/2983468.2983500. Krȧtky, P., & Chudȧ, D. (2016). Fine-tuning web traffic statistics by deduplication and splitting of visitors records using mouse biometrics. In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, CompSysTech ’16, pp. 300–306. ACM, New York, NY. USA. https://​doi.​org/​10.​1145/​2983468.​2983500.
Zurück zum Zitat Krátky, P., Repiský, T., & Chudá, D. (2017). Is the visitor reading or navigating?. In Proceedings of the 18th International Conference on Computer Systems and Technologies, CompSysTech’17, pp. 80–87. ACM, New York, NY. USA. https://doi.org/10.1145/3134302.3134330. Krátky, P., Repiský, T., & Chudá, D. (2017). Is the visitor reading or navigating?. In Proceedings of the 18th International Conference on Computer Systems and Technologies, CompSysTech’17, pp. 80–87. ACM, New York, NY. USA. https://​doi.​org/​10.​1145/​3134302.​3134330.
Zurück zum Zitat Mondal, S., & Bours, P. (2013). Continuous authentication using mouse dynamics. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–12. Mondal, S., & Bours, P. (2013). Continuous authentication using mouse dynamics. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG), pp. 1–12.
Zurück zum Zitat Nikiforakis, N., Joosen, W., & Livshits, B. (2015). Privaricator: deceiving fingerprinters with little white lies. In Proceedings of the 24th International Conference on World Wide Web, WWW ’15, pp. 820–830. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland. https://doi.org/10.1145/2736277.2741090. Nikiforakis, N., Joosen, W., & Livshits, B. (2015). Privaricator: deceiving fingerprinters with little white lies. In Proceedings of the 24th International Conference on World Wide Web, WWW ’15, pp. 820–830. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland. https://​doi.​org/​10.​1145/​2736277.​2741090.
Zurück zum Zitat Ord, T., & Furnell, S.M. (2000). User authentication for keypad-based devices using keystroke analysis. In Proceedings of the second international network conference (INC-2000), pp. 263–272. Ord, T., & Furnell, S.M. (2000). User authentication for keypad-based devices using keystroke analysis. In Proceedings of the second international network conference (INC-2000), pp. 263–272.
Zurück zum Zitat Porter, F. (2008). Goodness-of-fit - pitfalls and power example: Testing Consistency of Two Histograms. Porter, F. (2008). Goodness-of-fit - pitfalls and power example: Testing Consistency of Two Histograms.
Zurück zum Zitat Pusara, M., & Brodley, C.E. (2004). User re-authentication via mouse movements. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC ’04, pp. 1–8. ACM, New York, NY. USA. https://doi.org/10.1145/1029208.1029210. Pusara, M., & Brodley, C.E. (2004). User re-authentication via mouse movements. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC ’04, pp. 1–8. ACM, New York, NY. USA. https://​doi.​org/​10.​1145/​1029208.​1029210.
Zurück zum Zitat Sae-Bae, N., Ahmed, K., Isbister, K., & Memon, N. (2012). Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 977–986. ACM, New York, NY, USA. https://doi.org/10.1145/2207676.2208543. Sae-Bae, N., Ahmed, K., Isbister, K., & Memon, N. (2012). Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 977–986. ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​2207676.​2208543.
Zurück zum Zitat Saevanee, H., & Bhatarakosol, P. (2008). User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device. In 2008 International Conference on Computer and Electrical Engineering, pp. 82–86. https://doi.org/10.1109/ICCEE.2008.157. Saevanee, H., & Bhatarakosol, P. (2008). User Authentication Using Combination of Behavioral Biometrics over the Touchpad Acting Like Touch Screen of Mobile Device. In 2008 International Conference on Computer and Electrical Engineering, pp. 82–86. https://​doi.​org/​10.​1109/​ICCEE.​2008.​157.
Zurück zum Zitat Seo, S. (2006). A review and comparison of methods for detecting outliers in univariate data sets. Ph.D. thesis, Songwon Seo, M.S. University of Pittsburgh. Seo, S. (2006). A review and comparison of methods for detecting outliers in univariate data sets. Ph.D. thesis, Songwon Seo, M.S. University of Pittsburgh.
Zurück zum Zitat White, R.W., Ruthven, I., & Jose, J.M. (2002). Finding relevant documents using top ranking sentences: An evaluation of two alternative schemes. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’02, pp. 57–64. ACM, New York, NY, USA. https://doi.org/10.1145/564376.564389. White, R.W., Ruthven, I., & Jose, J.M. (2002). Finding relevant documents using top ranking sentences: An evaluation of two alternative schemes. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’02, pp. 57–64. ACM, New York, NY, USA. https://​doi.​org/​10.​1145/​564376.​564389.
Zurück zum Zitat Zhang, Q., & Sun, S. (2010). A Centroid k -Nearest Neighbor Method. In Advanced Data Mining and Applications: 6th International Conference, ADMA 2010, pp. 278–285. Springer Berlin Heidelberg. Zhang, Q., & Sun, S. (2010). A Centroid k -Nearest Neighbor Method. In Advanced Data Mining and Applications: 6th International Conference, ADMA 2010, pp. 278–285. Springer Berlin Heidelberg.
Metadaten
Titel
Recognition of web users with the aid of biometric user model
verfasst von
Peter Krátky
Daniela Chudá
Publikationsdatum
07.02.2018
Verlag
Springer US
Erschienen in
Journal of Intelligent Information Systems / Ausgabe 3/2018
Print ISSN: 0925-9902
Elektronische ISSN: 1573-7675
DOI
https://doi.org/10.1007/s10844-018-0500-0

Weitere Artikel der Ausgabe 3/2018

Journal of Intelligent Information Systems 3/2018 Zur Ausgabe