2022
DOI: 10.3390/make4020023
|View full text |Cite
|
Sign up to set email alerts
|

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Abstract: Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still monitored in order to continuously verify that the user is not an imposter who had access to the user credentials. Mouse dynamics is the behavior of a user’s mouse movements and is a biometric that has shown great promise for continuous authentication schemes. This art… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 38 publications
0
10
0
1
Order By: Relevance
“…Naïve Bayes can be split into three variants: Gaussian Naïve Bayes, Multinomial Naïve Bayes, and Bernoulli Naïve Bayes. Only the Gaussian Naïve Bayes and Multinomial Naïve Bayes were used since the Bernoulli variant deals with data with binary features (i.e., each feature can only take on two values) [19], [20]. The attempt to use the Multinomial variant resulted in an error due to the dataset not being able to assume the correct format for the variant to function properly.…”
Section: Resultsmentioning
confidence: 99%
“…Naïve Bayes can be split into three variants: Gaussian Naïve Bayes, Multinomial Naïve Bayes, and Bernoulli Naïve Bayes. Only the Gaussian Naïve Bayes and Multinomial Naïve Bayes were used since the Bernoulli variant deals with data with binary features (i.e., each feature can only take on two values) [19], [20]. The attempt to use the Multinomial variant resulted in an error due to the dataset not being able to assume the correct format for the variant to function properly.…”
Section: Resultsmentioning
confidence: 99%
“…Smartphone motion analysis supporting PIN-based authentication is proposed in [ 19 ]. Behavioral biometrics modalities such as keystroke and mouse dynamics often strengthen user authentication security in computer systems [ 20 , 21 ].…”
Section: Related Workmentioning
confidence: 99%
“…This lack of cybersecurity professionals is not limited to the government [16]. Additionally, automated systems such as authentication using machine learning are not enough to make up for this discrepancy [17], [18], [19]. Thus, considering the evident lack of cybersecurity professionals, it would be prudent for individuals to learn to protect themselves.…”
Section: Literature Reviewmentioning
confidence: 99%