Propitiating Behavioral Variability for Mouse Dynamics using Dimensionality Reduction Based Approach

  IJRES-book-cover  International Journal of Recent Engineering Science (IJRES)          
  
© 2016 by IJRES Journal
Volume-3 Issue-4
Year of Publication : 2016
Authors : S.Suganya, G.Muthumari, C.Balasubramanian
DOI : 10.14445/23497157/IJRES-V3I4P101

How to Cite?

S.Suganya, G.Muthumari, C.Balasubramanian, "Propitiating Behavioral Variability for Mouse Dynamics using Dimensionality Reduction Based Approach," International Journal of Recent Engineering Science, vol. 10, no. 4, pp. 1-5, 2016. Crossref, https://doi.org/10.14445/23497157/IJRES-V3I4P101

Abstract
To moderate the behavioral variability of mouse dynamics, the dimensionality reduction based approach was proposed. Mouse dynamics is the process of identifying the user based on their mouse operating behavior i.e.) how the user may operate the mouse on a particular period. The mouse dynamics data set includes mouse operation, co-ordinates axes and time stamp value, from the collected dataset, the schematic and motor-skill features were extracted to obtain feature vector. Then the dimensionality reduction based approaches were applied on feature vector space. Authentication task is done by SVM (Support Vector Machine) to identify whether the input sample was legitimate user(or)imposter. The test result proves that the proposed method Isomap (Isometric feature mapping) with SVM provides better performance than existing system KPCA.

Keywords
behavioral variability, mouse dynamics, feature vector, dimensionality reduction.

Reference
[1] Y. Bengio, J. Paiement, P. Vincent, O. Delalleau, N. Roux, andM. Ouimet, “Out-of-sample extensions for LLE, ISPMAP,MDS, eigenmaps, and spectral clustering,” in Advances in Neural Information Processing Systems.vol. 16, Cambridge, MA, USA: MIT Press, 2004.
[2] Ahmed and I. Traore, “Anomaly intrusion detection based on biometrics,”inProc. IEEE Inform. AssuranceWorkshop,West Point, NY,USA, 2005, pp. 452–453.
[3] S. Hashia, C. Pollett, and M. Stamp, “On using mouse movements as a biometric,” in Proc. Int. Conf. Comput. Sci. Appl., Singapore, 2005, pp. 143–147.
[4] Y. Nakkabi, L. Traore, and A. A. E. Ahmed, “Improving mouse dynamics biometric performance using variance reduction via extractors with separatefeatures,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 6, pp. 1345–1353, Nov. 2010.
[5] A.A.E.Ahmed and I.Traore,“A new biometric technology based on mouse dynamics,”IEEE Trans Depend .Secure Comput., vol. 4, no.3, pp.165–179, Jul.–Sep. 2007.
[6] Shen, Z. M. Cai, X. H. Guan, H. L. Sha, and J. Z. Du, “Feature analysis of mouse dynamics in identity authentication andmonitoring,”inProc. IEEE Int. Conf. Communication (ICC), Dresden, Germany, 2009, pp. 1–5.
[7] Y. Aksari and H. Artuner, “Active authentication by mouse movements,”inProc. 24th Int. Symp. Comput. Inform. Sci., Guzelyurt, Turkey, 2009,pp. 571–574.
[8] C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector machines,” ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 27:1–27:27,Apr. 2011
[9] Shen, Z. M. Cai, X. H. Guan, and J. L.Wang, “On the effectiveness and applicability of mouse dynamics biometric for authentication: A benchmark study,” in Proc. IAPR /IEEE Conf. Biometric, New Delhi, India,Mar. 2012, pp. 378–383.
[10] C. Shen, Z. M.Cai, andX. H.Guan, “Continuous authentication for mouse dynamics: A pattern-growth approach,” in Proc. IEEE /IFIP Conf. Dependable Syst. Netw., Boston, MA, USA, 2012, pp. 1–12.
[11] Chao Shen, ZhongminCai, Xiaohong Guan and Roy A.Maxion,“ User authentication through mouse dynamics,”IEEE Transaction on Information Forensics and security,Vol. 8,no.1,JAN 2013.
[12] ZhongminCai,Chao Shen, and Xiaohong Guan “Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach” in IEEE april 2014
[13] G.Muthumari, R. Shenbagaraj, M. Blessa Binolin Pepsi ” Mouse Gesture Based Authentication Using Machine Learning Algorithm”, 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT)
[14] http://nskeylab.xjtu.edu.cn/projects/mousedynamics/behaviordata-set.
[15] http://en.wikipedia.org/wiki/Network_security