User re-authentication via mouse movements

作者: Maja Pusara , Carla E. Brodley

DOI: 10.1145/1029208.1029210

关键词:

摘要: We present an approach to user re-authentication based on the data collected from computer's mouse device. Our underlying hypothesis is that one can successfully model behavior basis of user-invoked movements. implemented system raises alarm when current X, deviates sufficiently learned "normal" X. apply a supervised learning method discriminate among k users. empirical results for eleven users show we differentiate these individuals their movement with false positive rate 0.43% and negative 1.75%. Nevertheless, point out analyzing movements alone not sufficient stand-alone system.

参考文章(33)
Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection information assurance and security. ,(2000)
J. R. Quinlan, Data Mining Tools See5 and C5.0 RULEQUEST RESEARCH. ,(2004)
Stefan Axelsson, On a Difficulty of Intrusion Detection. recent advances in intrusion detection. ,(1999)
C.E. Landwehr, Protecting unattended computers without software annual computer security applications conference. pp. 274- 283 ,(1997) , 10.1109/CSAC.1997.646200
Steven L. Salzberg, Alberto Segre, Programs for Machine Learning ,(1994)
Christoph Michael, Anup Ghosh, Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report recent advances in intrusion detection. pp. 66- 79 ,(2000) , 10.1007/3-540-39945-3_5
Robert E. Schapire, A brief introduction to boosting international joint conference on artificial intelligence. ,vol. 2, pp. 1401- 1406 ,(1999)
Aaron Schwartzbard, Michael Schatz, Anup K. Ghosh, Learning program behavior profiles for intrusion detection ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 6- 6 ,(1999)
D. Endler, Intrusion detection. Applying machine learning to Solaris audit data annual computer security applications conference. pp. 268- 279 ,(1998) , 10.1109/CSAC.1998.738647