期刊文献+

基于鼠标动力学模型的用户身份认证与监控 被引量:8

Authentication and Monitoring of User Identities Based on Mouse Dynamics
下载PDF
导出
摘要 针对计算机系统安全中的用户身份识别和监控等基本问题,提出了一种利用鼠标动力学行为特征进行身份识别的新方法.通过采集各种应用环境下的鼠标行为数据,从交互和生理2个层面上对人机交互过程中计算机用户的鼠标行为特征进行建模、分析,以达到实时监测用户身份、检测非法用户的目的.所提方法可为身份监控原型系统实时采集用户的行为数据,并将当前的行为与用户的历史行为模型进行比较,以判断和检测用户身份,再依据判断检测结果产生实时的响应,从而有效防止非法用户侵入.实验采集并分析了10个用户的鼠标行为数据,通过特征降维与神经网络分类相结合的算法,得到了0.48%的误识率和2.86%的拒识率,充分展示了基于鼠标动力学行为模型进行身份认证和监控的可行性. User identification and monitoring is one of the most important issues in computer system security. A new method for user identification is presented based on the dynamics of computer mouse behavior. Data of mouse behavior in various applications are collected, and users' mouse behavior in human computer interaction is analyzed and modeled, specifically from both the interaction layer and the physiological layer. Based on the dynamic model, a real-time identity authentication and monitoring prototype system is developed, which can intercept users' mouse behavior data, and compare user's current behavior with his history behavior model in order to detect and authenticate current user's identity. According to the result of authentication, system responds real-time and defends against the intrusion of illegal user. An algorithm that uses feature dimension reduction and neural network for classification is applied in experiments for ten users. The experimental results show that mouse dynamics is effective for authenticating and monitoring user identities with a false accept rate (FAR) of 0.48% and a false rejection rate (FRR) of 2.86 %.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2008年第10期1235-1239,共5页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60736027 60574087) 国家高技术研究发展计划资助项目(2007AA01Z475 2007AA04Z154 2007AA01Z480 2007AA01Z464) 教育部博士点基金资助项目(20070698107) 陕西省自然科学基金资助项目(2006F46)
关键词 鼠标动力学 身份认证 身份监控 计算机系统安全 人机交互 mouse dynamics identity authentication identity monitoring computer system secu rity human computer interaction
  • 相关文献

参考文献12

  • 1O'GORMAN L. Comparing passwords, tokens, and biometrics for user authentication[J]. Proceedings of the IEEE, 2003, 91(12):2021-2040.
  • 2BLEHA S, SLIVINSKY C, HUSSIEN B. Computeraccess security systems using keystroke dynamics [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1990, 12(12) : 1217-1222.
  • 3OBAIDAT M S, SADOUN B. Verification of computer users using keystroke dynamics[J]. IEEE Transactions on System, Man, Cybernetics, 1997, 27(2):261 -269.
  • 4高艳,管晓宏,孙国基,冯力.基于实时击键序列的主机入侵检测[J].计算机学报,2004,27(3):396-401. 被引量:20
  • 5PUSARA M, BRODLEY C K User re-authentication via mouse movements [C] // Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York, USA: ACM, 2004: 1-8.
  • 6GAMBOA H, FRED A. A behavioral biometric system based on human computer interaction [EB/OL]. [2006 - 10 - 11]. http: //www. lx. it. pt/-afred/ anawebit/articles/AFredSPIE2004. pdf.
  • 7AHMED A A E, TRAORE I. Anomaly intrusion detection based on biometrics [C]//Proceedings of IEEE Information Assurance Workshop. Piscataway, NJ, USA: IEEE, 2005:452-453.
  • 8AHMED A A E, TRAORE I. Detecting computer intrusions using behavioral biometrics [EB/OL]. [2006- 08-19]. http://www. lib. unb. ca/Texts/PST/2005/ pdf/ahmed.pdf.
  • 9GARG A , SANKARANARAYANAN V, UPADH - YAYA S, et al. USim: a user behavior simulation framework for training and testing IDSes in GUI based systems [C] // Proceedings of 39th Annual Simulation Symposium. Los Alamitos, CA, USA: IEEE Computer Society, 2006: 196-203.
  • 10FITTS P M. The information capacity of the human motor system in controlling the amplitude of movement [J]. Journal of Experimental Psychology, 1954, 47 (6) :381-391.

二级参考文献8

  • 1[1]Bacel Rebecca, Mell2 Peter. Intrusion Detection Systems. NIST Special Publication, 2000
  • 2[2]Monrose F., Rubin A.D.. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 2000,(16): 351~359
  • 3[3]Gaines R., Lisowski W., Press S.. Authentication by keystroke timing: some preliminary results. Rand Corporation: Rand Report R-2560-NSF, 1980
  • 4[4]Leggett J., Williams G., Usnick J.. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 1991 ,(35): 859~870
  • 5[5]Napier R., Laberty W., Mahar W.. Keyboard user verification: Toward an accurate, efficient, and ecologically valid algorithm. International Journal of Human-Computer Studies, 1995,(43): 213~222
  • 6[6]Obaidat M.S., Sadoun Balqies. Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics, 1997, 27(2): 261~269
  • 7[7]Bleha D., Obaidat M.. Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Transactions on Systems, Man, and Cybernetics, 1991, 21: 452~456
  • 8[8]Bleha Saleh, Slivinsky Charles, Hussien Bassam. Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence,, 1990, 12(12): 1217~1222

共引文献19

同被引文献58

  • 1王任重,陶丹.基于上下文感知的智能手机隐式身份认证机制[J].北京邮电大学学报,2019,42(6):118-125. 被引量:2
  • 2谭文,杨潇,邵坚磊,等.Windows内核安全编程[M].北京:电子工业出版社,2009.
  • 3O'GORMAN L.Comparing passwords,tokens,and biometrics for user authentication[J].Proceedings of the IEEE,2003,91(12):2021-2040.
  • 4WAYMAN J,JAIN A,MALTONI D.Biometric Systems,Technology,Design and Performance Evaluation[M].Springer Publishing Company,2005.
  • 5OBAIDAT M S,SADOUN B.Verification of computer users using keystroke dynamics[J].IEEE Transaction on System,Man,Cybernetics,1997,27(2):261-269.
  • 6PUSARA M,BRODLEY C E.User re-authentication via mouse movements[A].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security,DMSEC Session[C].Washington DC,USA,2004.1-8.
  • 7GAMBOA H,FRED A.A behavioral biometric system based on human computer interaction[J].Proceedings of SPIE,2004,54:4-36.
  • 8AHMED A A E,TRAORE I.Anomaly intrusion detection based on biometrics[A].Proceedings of 6th IEEE Information Assurance Workshop[C].New York,USA,2005.452-453.
  • 9SHEN C,CAI Z M,GUAN X H,et al.Feature analysis of mouse dynamics in identity authentication and monitoring[A].Proceedings of the 2009 IEEE International Conference on Communication[C].Dresden,2009.1-5.
  • 10AHMED A A E,TRAORE I.Detecting computer intrusions using behavioral biometrics[A].3rd Annual Conference on Privacy,Security and Trust,St[C].Andrews,Canada,2005.91-98.

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部