Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System

  1. Daniel Garabato 1
  2. Jorge Rodríguez García
  3. Francisco J. Novoa 1
  4. Carlos Dafonte 1
  1. 1 Universidade da Coruña
    info

    Universidade da Coruña

    La Coruña, España

    ROR https://ror.org/01qckj285

Book:
XoveTIC 2019: The 2nd XoveTIC Conference (XoveTIC 2019), A Coruña, Spain, 5–6 September
  1. Alberto Alvarellos González (ed. lit.)
  2. José Joaquim de Moura Ramos (ed. lit.)
  3. Beatriz Botana Barreiro (ed. lit.)
  4. Javier Pereira Loureiro (ed. lit.)
  5. Manuel F. González Penedo (ed. lit.)

Publisher: MDPI

ISBN: 978-3-03921-444-0 978-3-03921-443-3

Year of publication: 2019

Congress: XoveTIC (2. 2019. A Coruña)

Type: Conference paper

Abstract

Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ mouse behavior is analyzed by means of classical Artificial Intelligence techniques, such as the Support Vector Machines or Multi-Layer Perceptrons. Such methods were found to perform particularly well, demonstrating the feasibility of mouse behavior analytics as a second-phase authentication mechanism. In addition, in the current stage of the experiments, the classification techniques were found to be very stable for the extracted features.