Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (5): 179-188.doi: 10.11959/j.issn.2096-109x.2022067
• Papers • Previous Articles
Cong YI1,2, Jun HU1,2
Revised:
2022-06-22
Online:
2022-10-15
Published:
2022-10-01
Supported by:
CLC Number:
Cong YI, Jun HU. Novel continuous identity authentication method based on mouse behavior[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 179-188.
"
特征 | 描述 | 数量 |
横坐标 | 横坐标的最小值、最大值、标准差、平均值、偏度、峰度 | 6 |
纵坐标 | 纵坐标的最小值、最大值、标准差、平均值、偏度、峰度 | 6 |
速度 | 切线,水平,竖直方向速度的最小值、最大值、标准差、平均值、偏度、峰度 | 18 |
加速度 | 加速度的最小值、最大值、标准差、平均值、偏度、峰度 | 6 |
加加速度 | 加加速度的最小值、最大值、标准差、平均值、偏度、峰度 | 6 |
角度 | 角度的最小值、最大值、标准差、平均值、偏度、峰度、和 | 7 |
角速度 | 角速度的最小值、最大值、标准差、平均值、偏度、峰度 | 6 |
曲率及曲率变化率 | 曲率及曲率变化率的最小值、最大值、标准差、平均值、偏度、峰度 | 12 |
时间间隔,停顿次数,停顿时间,停顿时间比例,鼠标事件数量,关键点数,点击鼠标时间 | 各1个 | 7 |
轨迹长度,直线距离,最大偏离,平直度,鼠标行为类型,方向 | 各1个 | 6 |
总计 | 80 |
[1] | 荆继武 . 网络可信身份管理的现状与趋势[J]. 信息安全研究, 2016,2(7): 666-668. |
JING J W . The development status and tendency of internet trusted identity management[J]. Journal of Information Security Research, 2016,2(7): 666-668. | |
[2] | JOSHI V B , RAVAL M S . Adaptive threshold for fingerprint recognition system based on threat level and system load[J]. Procedia Computer Science, 2020,171: 498-507. |
[3] | LIU Q , JIANG B , ZHANG J L ,et al. Semi-supervised uncorrelated dictionary learning for colour face recognition[J]. IET Computer Vision, 2020,14(3): 92-100. |
[4] | KUMAR M R , ARTHI K . An effective non-cooperative iris recognition system using hierarchical collaborative representation-based classification[J]. The Journal of Supercomputing, 2020,76(1): 1-14. |
[5] | AHMED A A E , TRAORE I . Biometric recognition based on free-text keystroke dynamics[J]. IEEE Transactions on Cybernetics, 2014,44(4): 458-472. |
[6] | CHANG T Y , TSAI C J , YEH J Y ,et al. New soft biometrics for limited resource in keystroke dynamics authentication[J]. Multimedia Tools and Applications, 2020,79(31-32): 23295-23324. |
[7] | AHMED A A E , TRAORE I . Detecting computer intrusions using behavioral biometrics[C]// 3rd Annual Conference on Privacy,Security and Trust. 2005: 91-98. |
[8] | AHMED A A E , TRAORE I . A new biometric technology based on mouse dynamics[J]. IEEE Transactions on Dependable & Secure Computing, 2007,4(3): 165-179. |
[9] | ZHENG N , PALOSKI A , WANG H . An efficient user verification system via mouse movements[C]// Proceedings of the 18th ACM Conference on Computer and Communications Security. 2011: 139-150. |
[10] | ZHENG N , PALOSKI A , WANG H . An efficient user verification system using angle-based mouse movement biometrics[J]. ACM Transactions on Information and System Security, 2016,18(3): 1-27. |
[11] | 徐剑, 李明洁, 周福才 ,等. 基于用户鼠标行为的身份认证方法[J]. 计算机科学, 2016,43(2): 148-154. |
XU J , LI M J , ZHOU F C ,et al. Identity authentication method based on user’s mouse behavior[J]. Computer Science, 2016,43(2): 148-154. | |
[12] | YILDIRIM M , ANARIM E . Session-based user authentication via mouse dynamics[C]// 27th Signal Processing and Communications Applications Conference. 2019: 1-4. |
[13] | 田杰, 宋礼鹏 . 基于鼠标及窗口行为的持续身份认证研究[J]. 中北大学学报(自然科学版), 2020,41(6): 511-519,526. |
TIAN J , SONG L P . Research on continuous identity authentication based on mouse and window behavior[J]. Journal of North China University(Nature Science Edtion), 2020,41(6): 511-519,526. | |
[14] | CHONG P , TAN Y X M , GUARNIZO J ,et al. Mouse authentication without the temporal aspect-what does a 2D-CNN learn[C]// IEEE Security and Privacy Workshops (SPW). 2018: 15-21. |
[15] | 沈超, 蔡忠闽, 管晓宏 ,等. 基于鼠标行为特征 的用户身份认证与监控[J]. 通信学报, 2010,31(7): 68-75. |
SHEN C , CAI Z M , GUAN X H ,et al. User authentication and monitoring based on mouse behavioral features[J]. Journal on Communications, 2010,31(7): 68-75. | |
[16] | KONONENKO I , . Estimating attributes:analysis and extensions of relief[C]// European Conference on Machine Learning. 1994: 171-182. |
[17] | LADHA L , DEEPA T . Feature selection methods and algorithms[J]. International Journal of Advanced Trends in Computer Science and Engineering, 2011,3(5): 1787-1797. |
[18] | 奖志军, 易华蓉 . 一种基于图像金字塔光流的 特征跟踪方法[J]. 武汉大学学报(信息科学版), 2007,32(8): 680-683. |
JANG Z J , YI H R . A feature tracking method based on image pyramid optical flow[J]. Journal of Wuhan University(Information Science Edition), 2007,32(8): 680-683. | |
[19] | ANTAL M , EGYED-ZSIGMOND E , . Intrusion detection using mouse dynamics[J]. IET Biometrics, 2019,8(5): 285-294. |
[20] | ALMALKI S , CHATTERJEE P , ROY K . Continuous authentication using mouse clickstream data analysis[C]// International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage. 2019: 76-85. |
[21] | YILDIRIM M , ANARIM E . Novel feature extraction methods for authentication via mouse dynamics with semi-supervised learning[C]// Innovations in Intelligent Systems and Applications Conference (ASYU). 2019: 1-6. |
[1] | Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI. Credible distributed identity authentication system of microgrid based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 88-98. |
[2] | Yueyang YE, Xinglan ZHANG. Research on anonymous identity authentication technology in Fabric [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 134-140. |
[3] | Xi FU,Hui LI,Xingwen ZHAO. Survey on phishing detection research [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 1-10. |
[4] | Hao WANG,Tianhao WU,Konglin ZHU,Lin ZHANG. Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 27-35. |
[5] | Fan CHAO,Zhi YANG,Xuehui DU,Yan SUN. Android malware detection method based on deep neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 67-79. |
[6] | Yingying CHEN,Feng ZHANG,Wenbao JIANG,Xu ZHOU. P2P network identity authentication mechanism based on trusted alliance [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 77-86. |
[7] | Hui XIAO,Bin WENG,Tianqiang HUANG,Han PU,Zehui HUANG. Video inter-frame tampering detection algorithm fusing multiple features [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 84-93. |
[8] | You YU, Yu FU, Xiaoping WU. Summary of text classification methods [J]. Chinese Journal of Network and Information Security, 2019, 5(5): 1-8. |
[9] | Shudi CHEN,Youwen ZHU. Shoulder-surfing resistant PIN-entry method [J]. Chinese Journal of Network and Information Security, 2019, 5(1): 87-93. |
[10] | Qiuhan WU,Wei HU. Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain [J]. Chinese Journal of Network and Information Security, 2018, 4(9): 60-65. |
[11] | Ren-ji HUANG,Xiao-ping WU,Hong-cheng LI. Identity authentication scheme based on identity-based encryption [J]. Chinese Journal of Network and Information Security, 2016, 2(6): 32-37. |
[12] | Tie-ming CHEN,Xiao-hao WANG,Wei-wei PANG,Jie JIANG. Time series and semantics-based chinese microblog topic detection and tracking method [J]. Chinese Journal of Network and Information Security, 2016, 2(5): 21-29. |
[13] | Chuan-wu MAO,Yang CHENG,Wen-ming YU. Method of dynamic real-time authentication [J]. Chinese Journal of Network and Information Security, 2016, 2(3): 76-85. |
[14] | Liang-min WANG,Ting-ting LI,Long CHEN. Security issues and system structure of internet of vehicles [J]. Chinese Journal of Network and Information Security, 2016, 2(2): 41-54. |
[15] | Jing-jing GUO,Jian-feng MA,Xin-xin GUO,Tao ZHANG. Study of cross-domain identity authentication in SOA environment [J]. Chinese Journal of Network and Information Security, 2016, 2(11): 21-29. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|