International Journal of Recent
Engineering Science

Research Article | Open Access | Download PDF
Volume 3 | Issue 4 | Year 2016 | Article Id. IJRES- V3I4P101 | DOI : https://doi.org/10.14445/23497157/IJRES-V3I4P101

Propitiating Behavioral Variability for Mouse Dynamics using Dimensionality Reduction Based Approach


S.Suganya, G.Muthumari, C.Balasubramanian

Citation :

S.Suganya, G.Muthumari, C.Balasubramanian, "Propitiating Behavioral Variability for Mouse Dynamics using Dimensionality Reduction Based Approach," International Journal of Recent Engineering Science (IJRES), vol. 3, no. 4, pp. 1-5, 2016. Crossref, https://doi.org/10.14445/23497157/IJRES- V3I4P101

Abstract

To moderate the behavioral variability of mouse dynamics, the dimensionality reduction based approach was proposed. Mouse dynamics is the process of identifying the user based on their mouse operating behavior i.e.) how the user may operate the mouse on a particular period. The mouse dynamics data set includes mouse operation, co-ordinates axes and time stamp value, from the collected dataset, the schematic and motor-skill features were extracted to obtain feature vector. Then the dimensionality reduction based approaches were applied on feature vector space. Authentication task is done by SVM (Support Vector Machine) to identify whether the input sample was legitimate user(or)imposter. The test result proves that the proposed method Isomap (Isometric feature mapping) with SVM provides better performance than existing system KPCA.

Keywords

behavioral variability, mouse dynamics, feature vector, dimensionality reduction.

References

[1] Y. Bengio, J. Paiement, P. Vincent, O. Delalleau, N. Roux, andM. Ouimet, “Out-of-sample extensions for LLE, ISPMAP,MDS, eigenmaps, and spectral clustering,” in Advances in Neural Information Processing Systems.vol. 16, Cambridge, MA, USA: MIT Press, 2004.
[2] Ahmed and I. Traore, “Anomaly intrusion detection based on biometrics,”inProc. IEEE Inform. AssuranceWorkshop,West Point, NY,USA, 2005, pp. 452–453.
[3] S. Hashia, C. Pollett, and M. Stamp, “On using mouse movements as a biometric,” in Proc. Int. Conf. Comput. Sci. Appl., Singapore, 2005, pp. 143–147.
[4] Y. Nakkabi, L. Traore, and A. A. E. Ahmed, “Improving mouse dynamics biometric performance using variance reduction via extractors with separatefeatures,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 6, pp. 1345–1353, Nov. 2010.
[5] A.A.E.Ahmed and I.Traore,“A new biometric technology based on mouse dynamics,”IEEE Trans Depend .Secure Comput., vol. 4, no.3, pp.165–179, Jul.–Sep. 2007.
[6] Shen, Z. M. Cai, X. H. Guan, H. L. Sha, and J. Z. Du, “Feature analysis of mouse dynamics in identity authentication andmonitoring,”inProc. IEEE Int. Conf. Communication (ICC), Dresden, Germany, 2009, pp. 1–5.
[7] Y. Aksari and H. Artuner, “Active authentication by mouse movements,”inProc. 24th Int. Symp. Comput. Inform. Sci., Guzelyurt, Turkey, 2009,pp. 571–574.
[8] C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector machines,” ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 27:1–27:27,Apr. 2011
[9] Shen, Z. M. Cai, X. H. Guan, and J. L.Wang, “On the effectiveness and applicability of mouse dynamics biometric for authentication: A benchmark study,” in Proc. IAPR /IEEE Conf. Biometric, New Delhi, India,Mar. 2012, pp. 378–383.
[10] C. Shen, Z. M.Cai, andX. H.Guan, “Continuous authentication for mouse dynamics: A pattern-growth approach,” in Proc. IEEE /IFIP Conf. Dependable Syst. Netw., Boston, MA, USA, 2012, pp. 1–12.
[11] Chao Shen, ZhongminCai, Xiaohong Guan and Roy A.Maxion,“ User authentication through mouse dynamics,”IEEE Transaction on Information Forensics and security,Vol. 8,no.1,JAN 2013.
[12] ZhongminCai,Chao Shen, and Xiaohong Guan “Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach” in IEEE april 2014
[13] G.Muthumari, R. Shenbagaraj, M. Blessa Binolin Pepsi ” Mouse Gesture Based Authentication Using Machine Learning Algorithm”, 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT)
[14] http://nskeylab.xjtu.edu.cn/projects/mousedynamics/behaviordata-set.
[15] http://en.wikipedia.org/wiki/Network_security