Next Article in Journal
System for Automatic Assessment of Alzheimer’s Disease Diagnosis Based on Deep Learning Techniques
Previous Article in Journal
Nonparametric Regression Estimation for Circular Data
Open AccessProceedings

Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System

Centro de investigación CITIC, Universidade da Coruña, Campus de Elviña s/n, 15071 A Coruña, Spain
*
Author to whom correspondence should be addressed.
Presented at the II XoveTIC Congress, A Coruña, Spain, 5–6 September 2019.
Proceedings 2019, 21(1), 29; https://doi.org/10.3390/proceedings2019021029
Published: 1 August 2019
(This article belongs to the Proceedings of XoveTIC Conference)
Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ mouse behavior is analyzed by means of classical Artificial Intelligence techniques, such as the Support Vector Machines or Multi-Layer Perceptrons. Such methods were found to perform particularly well, demonstrating the feasibility of mouse behavior analytics as a second-phase authentication mechanism. In addition, in the current stage of the experiments, the classification techniques were found to be very stable for the extracted features.
Keywords: authentication; computer security; artificial intelligence authentication; computer security; artificial intelligence
MDPI and ACS Style

Garabato, D.; García, J.R.; Novoa, F.J.; Dafonte, C. Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System. Proceedings 2019, 21, 29.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

1
Back to TopTop