Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System
Keyword(s):
Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ mouse behavior is analyzed by means of classical Artificial Intelligence techniques, such as the Support Vector Machines or Multi-Layer Perceptrons. Such methods were found to perform particularly well, demonstrating the feasibility of mouse behavior analytics as a second-phase authentication mechanism. In addition, in the current stage of the experiments, the classification techniques were found to be very stable for the extracted features.
2011 ◽
pp. 551-565
◽
2013 ◽
Vol 853
◽
pp. 600-604
◽
Keyword(s):
2019 ◽
Vol 6
(4)
◽
pp. 12-31