PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Features reduction for computer user profiling based on mouse activity

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The article is related to the computer systems security and to the problem of detecting the masqueraders, intruders who pretend to be legitimate users of computer systems, in particular. The research concerns computer user verification based on analysis of the mouse activity in computer system. The article presents an improvement of user verification method by introducing a new method of user profiling. The new user profiling method is based on the reduced number of features without the loss of information is introduced. The presented method of user profiling allows to simplify and speed up a user’s activity data analysis and is not causing the deterioration of intrusion detection. Additionally, a method of aggregating mouse activity basic events into a higher level events is described. This article presents the preliminary research and conclusions.
Rocznik
Tom
Strony
45--51
Opis fizyczny
Bibliogr. 10 poz., rys., tab., wykr.
Twórcy
autor
  • University of Silesia, Institute of Computer Science, Będzińska 39, 41-200 Sosnowiec, Poland
  • University of Silesia, Institute of Computer Science, Będzińska 39, 41-200 Sosnowiec, Poland
Bibliografia
  • [1] BANERJEE S. P., WOODARD D. L. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research, 2012, Vol. 7. pp. 116–139.
  • [2] DENNING D. E. Cyberspace attacks and countermeasures. 1997. In Internet Besieged D. E. Denning and P. J. Denning (eds), ACM Press, New York, pp. 29–55.
  • [3] FEHER C., ELOVICI Y., MOSKOVITCH R., ROKACH L., SCHCLAR A. User identity verification via mouse dynamics. Information Sciences, 2012, Vol. 201. pp. 19–36.
  • [4] KUDŁACIK P., PORWIK P., WESOŁOWSKI T. Fuzzy approach for intrusion detection based on user’s commands. Soft Computing, Springer-Verlag Berlin Heidelberg, 2015, doi: 10.1007/s00500-015-1669-6.
  • [5] PALYS M., DOROZ R., PORWIK P. On-line signature recognition based on an analysis of dynamic feature. In: IEEE Int. Conference on Biometrics and Kansei Engineering (ICBAKE 2013), Tokyo Metropolitan University Akihabara, 2013. pp. 103–107.
  • [6] PUSARA M., BRODLEY C. E. User re-authentication via mouse movements. In: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004. pp. 1–8.
  • [7] SALEM M. B., HERSHKOP S., STOLFO S. J. A survey of insider attack detection research. Insider Attack and Cyber Security: Beyond the Hacker, Advances in Information Security, Springer, 2008, Vol. 39. pp. 69–90.
  • [8] SCHONLAU M., ET AL. Computer intrusion: detecting masquerades. Statistical Science, 2001, Vol. 16. pp. 58–74.
  • [9] WESOŁOWSKI T., PALYS M., KUDŁACIK P. Computer user verification based on mouse activity analysis. Studies in Computational Intelligence, Springer International Publishing, 2015, Vol. 598. pp. 61–70.
  • [10] WESOŁOWSKI T. E., PORWIK P. Keystroke data classification for computer user profiling and verification. Computational Collective Intelligence, LNAI, Springer International Publishing, 2015, Vol. 9330. pp. 588–597.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b9ccfd2b-1673-4be3-adc3-07de5af846d7
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.