期刊文献+

鼠标行为HHT变换的工业互联网用户身份认证 被引量:2

User authentication of industrial internet based on HHT transform of mouse behavior
下载PDF
导出
摘要 工业互联网的快速发展引发了对网络安全的广泛关注,终端用户身份认证技术成为研究热点。根据工业互联网人机交互特点,设计了实验网站,收集了该网站24名用户两年半的非受控环境下鼠标行为数据作实例,采用希尔伯特黄变换(HHT,Hilbert-Huang transform)提取鼠标行为信号频域特征,结合时域特征,形成163维时频域联合特征矩阵,用于表征用户鼠标行为模式特征。使用Bagged tree、支持向量机(SVM,support vector machine)、Boost tree和K最邻近(KNN,K-nearest neighbor)算法构建网络用户身份认证模型,对比数据测试结果表明,Bagged tree算法在本案例中内部检测效果最佳,平均错误接受率(FAR,false acceptance rate)为0.12%、平均错误拒绝率(FRR,false rejection rate)为0.28%;外部检测中,平均FAR为1.47%。相较于传统鼠标动力学方法,使用HHT提取鼠标行为频域信息能更好地实现终端用户身份认证,为保障工业互联网安全提供有效的技术支撑。 The rapid development of the industrial internet had caused widespread concern about the network security,and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet,an experimental website was designed.24 users'mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform(HHT)was used to extract frequency domain features of mouse behavior signals,combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree,support vector machine(SVM),Boost tree and K-nearest neighbor(KNN)were used to build a user authentication model,and the comparison result showed that the Bagged tree had the best internal detection effect in this case,with an average false acceptance rate(FAR)of 0.12%and an average false rejection rate(FRR)of 0.28%.In external detection,the FAR was 1.47%.Compared with the traditional mouse dynamics method,the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication,and provide technical support the security of the industrial internet.
作者 张一弓 易茜 李剑 李聪波 尹爱军 易树平 ZHANG Yigong;YI Qian;LI Jian;LI Congbo;YIN Aijun;YI Shuping(State Key Laboratory of Mechanical Transmission,Chongqing University,Chongqing 400044,China;State Key Laboratory of Power Transmission Equipment and System Security and New Technology,Chongqing University,Chongqing 400044,China)
出处 《物联网学报》 2022年第2期77-87,共11页 Chinese Journal on Internet of Things
基金 国家自然科学基金资助项目(No.71671020) 中央高校基本科研业务费资助项目(No.2021CDJKYJH 022)。
关键词 工业互联网 身份认证 鼠标行为 希尔伯特黄变换 Bagged tree industrial internet identity authentication mouse behavior Hilbert-Huang transform Bagged tree
  • 相关文献

参考文献5

二级参考文献27

  • 1王任重,陶丹.基于上下文感知的智能手机隐式身份认证机制[J].北京邮电大学学报,2019,42(6):118-125. 被引量:2
  • 2钱竞光,宋雅伟,叶强,李勇强,唐潇.步行动作的生物力学原理及其步态分析[J].南京体育学院学报(自然科学版),2006,5(4):1-7. 被引量:95
  • 3O'GORMAN L.Comparing passwords,tokens,and biometrics for user authentication[J].Proceedings of the IEEE,2003,91(12):2021-2040.
  • 4WAYMAN J,JAIN A,MALTONI D.Biometric Systems,Technology,Design and Performance Evaluation[M].Springer Publishing Company,2005.
  • 5OBAIDAT M S,SADOUN B.Verification of computer users using keystroke dynamics[J].IEEE Transaction on System,Man,Cybernetics,1997,27(2):261-269.
  • 6PUSARA M,BRODLEY C E.User re-authentication via mouse movements[A].Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security,DMSEC Session[C].Washington DC,USA,2004.1-8.
  • 7GAMBOA H,FRED A.A behavioral biometric system based on human computer interaction[J].Proceedings of SPIE,2004,54:4-36.
  • 8AHMED A A E,TRAORE I.Anomaly intrusion detection based on biometrics[A].Proceedings of 6th IEEE Information Assurance Workshop[C].New York,USA,2005.452-453.
  • 9SHEN C,CAI Z M,GUAN X H,et al.Feature analysis of mouse dynamics in identity authentication and monitoring[A].Proceedings of the 2009 IEEE International Conference on Communication[C].Dresden,2009.1-5.
  • 10AHMED A A E,TRAORE I.Detecting computer intrusions using behavioral biometrics[A].3rd Annual Conference on Privacy,Security and Trust,St[C].Andrews,Canada,2005.91-98.

共引文献28

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部