计算机科学 ›› 2016, Vol. 43 ›› Issue (2): 148-154.doi: 10.11896/j.issn.1002-137X.2016.02.033

• 信息安全 • 上一篇    下一篇

基于用户鼠标行为的身份认证方法

徐剑,李明洁,周福才,薛锐   

  1. 东北大学软件学院 沈阳110819;中国科学院信息工程研究所信息安全国家重点实验室 北京100093,东北大学软件学院 沈阳110819,东北大学软件学院 沈阳110819,中国科学院信息工程研究所信息安全国家重点实验室 北京100093
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家科技重大专项基金项目(2013ZX03002006),辽宁省科技攻关项目(2013217004),辽宁省博士启动基金项目(20141012),中央高校基本科研业务费专项资金(N130317002),信息安全国家重点实验室开放课题项目(2014-15)资助

Identity Authentication Method Based on User’s Mouse Behavior

XU Jian, LI Ming-jie, ZHOU Fu-cai and XUE Rui   

  • Online:2018-12-01 Published:2018-12-01

摘要: 针对已有身份认证方法存在的问题,提出了一种基于用户鼠标行为的身份认证方法。首先,给出了基于用户鼠标行为的身份认证模型及其实体构成,之后采用层次化划分方法对用户鼠标行为进行了定义,同时给出了不同行为需要提取的特征值及对应的计算方法。采用随机森林分类器作为鼠标行为分类工具,以解决已有方案中存在的数据的过度拟合和数据噪声问题。在身份认证阶段,结合用户鼠标行为,采用层次结构的分类决策模型对用户身份进行认证。最后,对所提出的身份认证方法进行了实验分析,结果表明该方法具有较好的错误拒绝率和错误接受率。

关键词: 身份认证,鼠标行为,随机森林

Abstract: Aiming at the problems of existing solution for identity authentication,the paper provided a method about the identity authentication based on mouse behaviour.First,it gave the authentication model based on the mouse action and the entity set,and then defined the mouse action by hierarchical division method.At the same time,it gave the definition of features related to the mouse action and the computing method.The paper used random forest classifier as the classification tool to solve the problem of data over-fitting and noise in the existing solution.In the phase of authentication,it used hierarchical classification-decision model for identity authentication.Finally,the paper analyzed the method through experiment,showing a better false rejection rate and false acceptance rate.

Key words: Identity authentication,Mouse behavior,Random forest

[1] Wang Yi,Hu Jian-kun.Global Ridge Orientation Modeling for Partial Fingerprint Identification [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,33(1):72-87
[2] Jing Xiao-yuan,Li Sheng,Zhang D,et al.Optimal subset-division based discrimination and its kernelization for face and palmprint recognition[J].Pattern Recognition,2012,45(10):3590-3602
[3] Su Yu,Shan Shi-guang,Chen Xi-lin,et al.[J].Journal of Software,2010,1(8):1849-1862(in Chinese) 苏煜,山世光,陈熙霖,等.基于全局和局部特征集成的人脸识别[J].软件学报,2010,1(8):1849-1862
[4] Nigam A,Gupta P.Iris recognition using consistent corner optical flow [C]∥Proc of 11th Asian Conference on Computer Vision.2012:358-369
[5] Lee P J-W,Choi S-S,Moon P B-R.An evolutionary keystroke authentication based on ellipsoidal hypothesis space [C]∥ Proc of the 9th Annual Conference on Genetic and Evolutionary Computation.2007:2090-2097
[6] Ahmed,TraoreIssa A A.Biometric recognition based on free-text keystroke dynamics [J].IEEE Transactions on Cyberne-tics,2014,44(4):458-472
[7] Ahmed A A E,Traore I.Detecting computer intrusions usingbehavioral biometrics[C]∥ Proc of 3rd Annual Conference on Privacy.Security,2005:91-98
[8] Jorgensen Z,Yu T.On mouse dynamics as a behavioral biome-tric for authentication[C]∥Proc of the 6th ACM Symposium on Information,Computer and Communications Security.2011:476-482
[9] Gamboa H,Fred A L N,Jain A K.Webbiometrics:User verification via web interaction[C]∥ Proc of 2007 Biometrics Symposium.2007:1-6
[10] Pusara M,Brodley C E.User re-authentication via mouse movements[C]∥ Proc of the 2004 ACM workshop on Visualization and data mining for computer security.2004:1-8
[11] Bours P,Fullu C J.A login system using mouse dynamics[C]∥ Proc of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2009:1072-1077
[12] Schulz D A.Mouse curve biometrics[C]∥ Proc of 2006 Biome-trics Symposium.2006:79-83
[13] Ahmed A A E,Traore I.A new biometric technology based on mouse dynamics[J].IEEE Transactions on Dependable and Secure Computing,2007,4(3):165-179
[14] Shen Chao,Cai Zhong-min,Guan Xiao-hong,et al.User authentication and monitoring based on mouse behavioral features[J].Journal on Communications,2010,1(7):68-75(in Chinese) 沈超,蔡忠闽,管晓宏,等.基于鼠标行为特征的用户身份认证与监控[J].通信学报,2010,1(7):68-75

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!