Novel continuous identity authentication method based on mouse behavior

With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentica...

Full description

Saved in:
Bibliographic Details
Main Authors: Cong YI, Jun HU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022067
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529738685841408
author Cong YI
Jun HU
author_facet Cong YI
Jun HU
author_sort Cong YI
collection DOAJ
description With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.
format Article
id doaj-art-c480b502114e4383958a1042ed63329b
institution Kabale University
issn 2096-109X
language English
publishDate 2022-10-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-c480b502114e4383958a1042ed63329b2025-01-15T03:16:16ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-10-01817918859575845Novel continuous identity authentication method based on mouse behaviorCong YIJun HUWith the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022067identity authenticationmouse behaviorneighborhood rough setfeature selectiontrust model
spellingShingle Cong YI
Jun HU
Novel continuous identity authentication method based on mouse behavior
网络与信息安全学报
identity authentication
mouse behavior
neighborhood rough set
feature selection
trust model
title Novel continuous identity authentication method based on mouse behavior
title_full Novel continuous identity authentication method based on mouse behavior
title_fullStr Novel continuous identity authentication method based on mouse behavior
title_full_unstemmed Novel continuous identity authentication method based on mouse behavior
title_short Novel continuous identity authentication method based on mouse behavior
title_sort novel continuous identity authentication method based on mouse behavior
topic identity authentication
mouse behavior
neighborhood rough set
feature selection
trust model
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022067
work_keys_str_mv AT congyi novelcontinuousidentityauthenticationmethodbasedonmousebehavior
AT junhu novelcontinuousidentityauthenticationmethodbasedonmousebehavior