D. Garabato, Jorge Rodríguez García, Francisco Javier Nóvoa de Manuel , Carlos Dafonte
Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ mouse behavior is analyzed by means of classical Artificial Intelligence techniques, such as the Support Vector Machines or Multi-Layer Perceptrons. Such methods were found to perform particularly well, demonstrating the feasibility of mouse behavior analytics as a second-phase authentication mechanism. In addition, in the current stage of the experiments, the classification techniques were found to be very stable for the extracted features.
© 2008-2024 Fundación Dialnet · Todos los derechos reservados