2022
DOI: 10.3390/s22176627
|View full text |Cite
|
Sign up to set email alerts
|

User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes

Abstract: In order to improve user authentication accuracy based on keystroke dynamics and mouse dynamics in hybrid scenes and to consider the user operation changes in different scenes that aggravate user status changes and make it difficult to simulate user behaviors, we present a user authentication method entitled SIURUA. SIURUA uses scene-irrelated features and user-related features for user identification. First, features are extracted based on keystroke data and mouse movement data. Next, scene-irrelated features… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Shi, X. Wang, Zheng, and Cao [43] proposed a user authentication method based on KD and mouse dynamics involving comparison of all of the representative time windows and dimensionality-reduction targets of the KD features to determine the parameters for ensuring the robustness of the algorithm and, using real-world setting, the HCI dataset achieved 89.22% accuracy in authenticating users, thus demonstrating the effectiveness of the algorithm. X. Wang, Shi, Zheng, Zhang, Hong, and Cao [44] presented a user authentication method that relies on scene-related and user-related features for user identification: first, features are extracted based on keystroke and mouse movement data; next, scene-related features are obtained that have a low correlation with scenes; lastly, scene-related and user-related features are fused to ensure their integrity. This proposed method has the advantage of improving user authentication accuracy in hybrid scenes, with an accuracy of 84%.…”
Section: Behavioral Authentication Using MLmentioning
confidence: 99%
“…Shi, X. Wang, Zheng, and Cao [43] proposed a user authentication method based on KD and mouse dynamics involving comparison of all of the representative time windows and dimensionality-reduction targets of the KD features to determine the parameters for ensuring the robustness of the algorithm and, using real-world setting, the HCI dataset achieved 89.22% accuracy in authenticating users, thus demonstrating the effectiveness of the algorithm. X. Wang, Shi, Zheng, Zhang, Hong, and Cao [44] presented a user authentication method that relies on scene-related and user-related features for user identification: first, features are extracted based on keystroke and mouse movement data; next, scene-related features are obtained that have a low correlation with scenes; lastly, scene-related and user-related features are fused to ensure their integrity. This proposed method has the advantage of improving user authentication accuracy in hybrid scenes, with an accuracy of 84%.…”
Section: Behavioral Authentication Using MLmentioning
confidence: 99%
“…Finally, in the field of security, a recent paper [33] used metaheuristics to augment a neural network to improve keystroke dynamics. Touch gestures were used by Stylios et al [34] to improve authentication, while Wang et al [35] used mouse clicks. A key concern of security is preserving privacy, and while keystroke dynamics help with identification and authentication, the nature of the data collected raises privacy concerns [36], which can be ameliorated via privacy preserving methods, such as used by Acar et al in [37]: fuzzy hashing and fully homomorphic encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Campisis [12] security smartphone verification Kambourakis [13] security smartphone authenticating Oyebola [15] dataset collection keyboard, smartphone, tablet any Wahab [7] security keyboards verification Alsuhibany [16] security tablet authentication Killourhy [17] clock testing keyboard any Shekhawat [18] security keyboard with sensor authentication Ning [19] health smartphone brain health Senerath [20] security smartphone authentication Tsimperidis [21] HCI keyboard gender, age, handedness Tsimperidis [22] HCI keyboard language Saugbacs [23] emotion smartphone stress Cascone [25] HCI smartphone age, gender, user experience Lamiche [26] security smartphone authentication Roy [28] health keyboard Parkinson's disease Acien [29] health keyboard mental fatigue Roy [30] HCI smartphone age, gender Chen [31] security keyboard authentication Tsimperidis [32] HCI keyboard education level ElKenawy [33] security smartphone authenticating Stylios [34] security smartphone authenticating Wang [35] security keyboard, mouse authenticating Hatin [36] security smartphone authentication with privacy Acar [37] security keyboard authentication with privacy…”
Section: Paper Field Input Type Applicationmentioning
confidence: 99%
“…By analyzing patterns in user movements, gait, and other behavioral cues, the model learns to distinguish between genuine and unauthorized individuals. This approach offers several potential advantages over traditional authentication techniques [6][7][8][9]: Continuous Authentication (CA) Unlike one-time authentication methods, which only verify users at specific intervals, the ML model can continuously assess the authenticity of users based on their ongoing activity patterns. This dynamic authentication process adds an extra security layer, reducing the likelihood of unauthorized access.…”
mentioning
confidence: 99%