Continuous User Identity Verification Via Mouse Gesture Dynamics

advertisement
Continuous User Identity Verification Via Mouse Gesture Dynamics
Prasanna Y. Kumawat
ME- Comp, SRES College Of Engineering, Kopargaon,
(Pune University)
Abstract: Most of the online websites and ebanks
uses alphanumeric username and password to
identity user. But such a credentials like
passwords,PIN’s(Personal identification Number),
smartcards etc. are easily stolen by hackers. User
verification method provides additional layer of
security to existing computer security. So in this
paper I am introducing a novel method that
continuously verifies users according to
characteristics of their interaction with pointing
device of the computer (e.g. mouse,touch pad ) .
Keywords- Mouse dynamics, Behavioral biometrics,
Security monitoring, Verification, Mouse, Pointing
devices
Behavioral biometric scheme is applicable to
high risk environments or where the cost of
unauthorized use of a computer is high, continuous
verification of the user’s identity is extremely
important. Continuous user identity verification
scheme has built around the biometrics supplied by
the user behavioural characteristics and continuously
check the identity of the user throughout a session.
These user characteristics are captured and are stored
in database according to each user’s profile.
Whenever user user tries to relogin into the system
these user characteristics are compared with current
user’s characteristics. From that user identity is
verified by the system.
II.
I.
INTRODUCTION
Now a days most of the online websites and
ebanks, identifies users by using usernames and
passwords or PINS. But there are many hacking
techniques to steal such a user credientials. Some of
the techniques are phishing attacks, key logger and so
on. User verification process adds one more layer to
existing security level. There are two types of user
verification methods. One is Physiological
verification and second is Behavioral verification.
Drawback of physiological verification method is
required dedicated hardware devices like retina or
finger print scanner. And these devices are expensive
and are not available easily. So cost for implementing
physiological verification scheme is more. On the
otherhand behavioral biometric verification method
do not required dedicated hardware. It uses
commonly available devices like mouse or keyboard.
In [2] there is survey on Keystroke Dynamics which
is one of the famous biometric technologies, which
will try to identify the authenticity of a user when the
user is working via a keyboard. The verification
process is done by observing change in the typing
pattern of user. In [1] we get how actually mouse
based method is work. It also provides basic metrics
to measure performance of behavioral biometric
devices. Since biometric-based verification systems
are a special case of classifiers [4], their performance
is
evaluated
using
similar
measurements.
Specifically, the following measurements are used:
RELATED WORK
As we know recently a number of researches were
conducted to explore the utilization of machine
learning techniques in different biometric systems.
Most commonly behavioral verification techniques
based on (a) Mouse dynamics,which are derived from
the user mouse interaction and the focus of this
implementation is based on mouse dynamics of the
user; (b) Keystroke dynamics,which derived from
keyboard activity. Such as frequency of key pressing
and typing speed etc; (c) Software interaction,which
rely on features extracted from the interaction of user
with specific software tool. Several works on
Keyboard dynamics has already done. [1] has stated
mouse dynamics method can be categorized into two
types of learning: implicit and explicit.



False Acceptance Rate (FAR) – measures
the ratio between the number of attacks that
were erroneously labeled as authentic
interactions and the total number of attacks.
False Rejection Rate (FRR) – measures the
ratio between the number of legitimate
interactions that were erroneously labeled as
attacks and the total number of legitimate
interactions.
ROC Curve – A ROC curve is a graphical
representation of the tradeoff between the
FAR and the FRR for various threshold
values.


Area Under Curve (AUC) – measures the
area under the ROC curve. A lower AUC is
sought after since it corresponds to better
performance.
Equal Error Rate (EER) – The rate at
which both acceptance and rejection error
rates are equal. Low EER values indicate an
accurate authentication system.
III.
PROPOSED WORK
In this paper I am proposing a novel verification
method which verifies a user based on each
individual mouse action. This method requires the
mouse events generated during user interaction. It
takes aggregation of its coordinates and different
activities before accurate user verification process.
Verification of each individual mouse action
increases the accuracy while reducing the time that is
needed to verify the identity of the user since the
fewer actions are required to achieve a specific
accuracy level, as compared to the histogram- based
approach which is explained in [1]. The general
architecture of the proposed system is shown in fig.1.
Figure.1 General System Architecture
A biometric-based user verification system is
essentially a pattern recognition system that acquires
biometric data from an individual, extracts a feature
set to establish a unique user signature and constructs
a verification model by training it on the set of
signatures.
The system is divided into mainly two phases as
follows;
I. Training Phase: In the training phase, the training
data was used to build the classifier model and store
the model in a database for use in testing phase. Each
genuine user has his/her own classifier model.
II. Testing Phase: In the testing phase, we are going
to test data which was separated from the training
data for comparison. In the comparison, we will use
the model stored in the database and obtain the
classifier score (probability) on each sample of the
test data. This score will then be used to update the
trust value C in the trust model. Finally, the trust
value C was used in the decision module, to
determine if the user will be locked out or can
continue using the PC. This decision was made based
on the current trust value and the lockout threshold.
Both the phases uses common components as
follows:
 Event acquisition - captures the events
generated by the various input devices used
for the interaction (e.g. mouse) via their
drivers, some mouse events can be left down
(LD), left up (LU), right down (RD), right
up (RU), mouse move (MM), silence (S)
etc.
 Feature extraction - High level features can
be extracted from that events and the
signature will be constructed which
characterizes the behavioral biometrics of
the user, The features may include Left
Click (LC), Right Click (RC), Mouse Move
Sequence (MMS) etc.
 Classifier Model - is used to build the user
verification model to classify the signatures.
During verification, the model is used to
classify new samples acquired from the user.
Any classifiers can be used depend on its
availability and its knowledge.
 Store Model- is used to store the signature
of user. If multiple users exist for system,
then upon the entry of a username, signature
of that user will retrieve for verification
process [1].
In the store model i.e database, the signature
will consist number of mouse moves; number of left
clicks, number of right clicks, number of silence
along with time intervals and aggregation of mouse
Co-ordinates. Same type of signature will be created
for every session.
IV.
CONCLUSION
In this paper I introduces a novel method for user
identity verification which based on mouse dynamics.
As it is difficult to trace mouse movements of
particular user, this approach is more secure than any
other authentication system. So this method adds one
more layer to existing security methods.
REFERENCES
1.
2.
3.
Clint Feher, Yuval Elovici, Robert
Moskovitch, Lior Rokach, Alon Schclar,
“User identity verification via mouse
dynamics”, Information Sciences 201 (2012)
19–36.
D. Shanmugapriya, Dr. G. Padmavathi, “A
Survey
of
Biometric
keystroke
Dynamics:Approaches,
Security
and
Challenges”, IJCSI Vol. 5, No. 1(2009).
E. Erzin, Y. Yemez, A.M. Tekalp, A. Eril,
H. Erdogan, H. Abut, "Multimodal person
recognition for human vehicle interaction",
IEEE MultiMedia (2006) 18-31.
4.
P. Grother, E. Tabassi, "Performance of
biometric
quality
measures",
IEEE
Transactions on Pattern Analysis and
Machine Intelligence (2007) 531-543.
5.
A.A.E. Ahmed, I. Traore, "A new biometric
technology based on mouse dynamics",
IEEE Transactions on Dependable and
Secure Computing (2007)165-179.
6.
M. De Marsico, M. Nappi, D. Riccio, G.
Tortora, "NABS: novel approaches for
biometric systems", IEEE Transactions on
Systems, Man, and Cybernetics, Part C:
Applications and Reviews (2011) 481-493.
7.
B J Gorad, D.V Kodavade, "User Identity
Verification Using Mouse Signature", IOSR
Journal of Computer Engineering (2013) 3336
Download