Abstract

Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in technologies and hacking skills of the people. Various techniques are available that can provide some level of security. The problem of unintended side-effects of inconsistent experimental condition and environmental variables by restricting user's mouse operation to a tightly-controlled environment has been addressed with the solution of mouse operations as dynamics. Mouse dynamics measures and assesses a user's mouse-behavior characteristic for use as a biometric. For Each mouse operation task both holistic and procedural features are extracted. This type of authentication is very simple and efficient for the users. Then a Nearest Neighbor algorithm is employed for extracting the feature and anytime algorithm for the accuracy and speed. This approach achieves to improve the number of users with a false acceptance rate of 8.75% and a false rejection rate of 7.70%.This approach could lead to a performance boost both in authentication accuracy and authentication time. I. Introduction As data are moved from traditional localized computing environments to the new cloud computing paradigm, the need for better authentication has become more pressing. These things should provide public confidence in the security of the current information infrastructure; the inadequacy of password-based authentication mechanism is becoming a major concern for the entire information society of various solutions to this problem, a particularly promising technique is mouse dynamics. Hence it is suitable for the current internet environment. When users try to log into a computer system, mouse dynamic only requires her to provide the login name and to perform certain sequence of mouse operations. Mouse dynamic based user authentication, usually only the data from the legitimate user are readily available, since the user would choose her specific sequence of mouse operation and would not share it with others. A mouse dynamic based user authentication performs authentication in a short time while maintaining high accuracy. The several properties are (a) it is easy to comprehend and implement, (b) it requires no specialized hardware (c) it requires only about 12 seconds o mouse behavior data to provide good, steady performance. Mouse dynamic is a behavioral biometric for analyzing behavior data from pointing devices, provides user authentication in an accessible and convenient manner. The mouse dynamic is mostly used for intrusion detection, which analyzes mouse-behavior characteristics at particular moments. Information security (IS) The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.