2019
DOI: 10.1007/978-3-030-24900-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Continuous Authentication Using Mouse Clickstream Data Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 13 publications
1
6
0
Order By: Relevance
“…Both the 1D-CNN and LSTM-RNN observed miniscule standard deviations among the top-10 users, indicating consistent authentications when model is performing at a high level, but this cannot be extrapolated to all users. Random forests appear to be one of the generally best performing machine learning algorithms for user authentication on mouse dynamics in accordance with the previous literature [34,35], and our machine learning models' results concur. The SVM and KNN had lower performances on the dataset as compared to the random forest.…”
Section: Discussion and Analysissupporting
confidence: 91%
“…Both the 1D-CNN and LSTM-RNN observed miniscule standard deviations among the top-10 users, indicating consistent authentications when model is performing at a high level, but this cannot be extrapolated to all users. Random forests appear to be one of the generally best performing machine learning algorithms for user authentication on mouse dynamics in accordance with the previous literature [34,35], and our machine learning models' results concur. The SVM and KNN had lower performances on the dataset as compared to the random forest.…”
Section: Discussion and Analysissupporting
confidence: 91%
“…X is the characteristic matrix of the mouse, which is divided into training set and test set according to different O values. L is the mouse label matrix, and the size of the matrix depends on the number of samples n. is system is a binary classification model [54], so the label is defined as (0, 1), where the legal user is 1 and the illegal user is 0. Op for libsvm training custom parameters, including kernel function and other values, in this system is mainly selected by using the exhaustive method.…”
Section: Training and Testing Of The Mouse Modelmentioning
confidence: 99%
“…They used a one class SVM classifier that achieved a FAR of 0.37% and a FRR of 1.12%. In [2] Almalki et al conducted an empirical evaluation of classical machine learning classification techniques for mouse dynamics in continuous authentication scenarios. They extracted a set of 39 features (inspired in [3]) from individual mouse actions.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we summarise in Table 5 a comparison of our approach and evaluation results with those of existing works in literature in terms of (1) adversarial strategy used to generate attacks, (2) whether the approach is evaluated in a public dataset,(3) the AUC performance of authentication models, (4) the attack success rate for artificial generated attacks; and (5) whether the generated can be adapted to goal-oriented attacks. The question mark in Goaloriented attack column means that we think those kinds of attacks Session 1: Adversarial Machine Learning AISec '20, November 13, 2020, Virtual Event, USA are extensible to goal-oriented scenarios because of the way they were designed, but there is no formal studies proving their goaloriented feasibility.…”
Section: Related Workmentioning
confidence: 99%