Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling

نویسندگان

  • Daniela Chudá
  • Peter Krátky
چکیده

Biometrics could be used to suppress impersonation in e-learning systems and thus to improve credibility of exams taken at home. Mouse usage characteristics are cheap and widely accessible alternative to other forms of biometrics reaching promising results in identity verification task. The paper provides preliminary results of cheating detection method based on mouse usage data gathered in an e-learning system. Mouse path is analyzed in deeper by decomposition to arcs and straight segments in order to study single-intent moves and to reveal curve characteristics. The paper also describes preliminary results of predicting learning styles of students according to the characteristics of computer mouse usage patterns for further recommendation of suitable materials. Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Impersonation Attacks in Future Wireless and Mobile Networks

Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio Frequency Fingerprinting and User Mobility Pr...

متن کامل

Security: DArPA

I dentity verification for access control presents a trade-off between maximizing the probability of intruder detection and minimizing the cost for the legitimate user in terms of distractions and hardware requirements. In recent years, researchers have extensively explored behavioral biometric systems to address this challenge. 1 These systems rely on input devices, such as the keyboard and mo...

متن کامل

User Generate Spatial Content in Land Administration and Cadastre: Types and Usage

Nowadays, one of the most important factor for better land management are the land administration systems. Therefore, it is necessary accurate and up-to-date data on these systems. Common data collection methods, such as photogrammetry and remote sensing, are usually cost-effective and somewhat time-consuming. So, it is necessary to find new methods for data collection in order to keep land adm...

متن کامل

User Authentication via Mouse Biometrics and the usage of Graphic User Interfaces: An Application Approach

In this paper we propose the construction of the user behaviour based on a relatively new mouse-based behavioural biometric and the usage of graphic user interfaces (GUIs) utilizing the application approach, pretending to use this behaviour to transparently reauthenticate the users with a free interaction in the computer system using an anomaly detection approach, avoiding the user masquerading...

متن کامل

Keyboard Usage Authentication Using Time Series Analysis

In this paper, we introduce a new approach to recognising typing behaviour (biometrics) from an arbitrary text in heterogeneous environments using the context of time series analytics. Our proposed method differs from previous work directed at understanding typing behaviour, which was founded on the idea of usage a feature vector representation to construct user profiles. We represent keystroke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJHCITP

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2015