User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study

Penny Chong, Yuval Elovici, Alexander Binder

Research output: Contribution to journalArticlepeer-review

55 Scopus citations

Abstract

Recently conducted research demonstrated the potential use of mouse dynamics as a behavioral biometric for user authentication systems. However, the state-of-the-art methods in this field rely on classical machine learning methods that necessitate the design of hand crafted mouse features for feature extraction. To simplify the feature extraction process, we leverage various deep learning architectures for mouse movement sequences classification, including convolutional networks, recurrent networks, and a hybrid model which combines convolutional and recurrent layers. It is known that the training of these networks with random initialization of weights on small datasets will produce models that perform poorly. Therefore, we consider a two-dimensional convolutional neural network that allows transfer learning, which is a domain adaptation technique effective for learning on small datasets. Although employing such architecture may seem counterintuitive, since the temporal information is discarded from the input data, the architecture has outperformed all the other deep architectures investigated, as well as a classical machine learning method. In order to understand the features learned, we adopt the layer-wise relevance propagation (LRP) algorithm to compute relevance scores for each part of the mouse curves. In addition, the models are measured for their usability and effectiveness in realistic scenarios.

Original languageEnglish
Article number8768407
Pages (from-to)1086-1101
Number of pages16
JournalIEEE Transactions on Information Forensics and Security
Volume15
DOIs
StatePublished - 1 Jan 2020
Externally publishedYes

Keywords

  • Behavioral biometrics
  • CNN
  • LRP
  • LSTM
  • mouse dynamics
  • weighted learning

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study'. Together they form a unique fingerprint.

Cite this