Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling

Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling

Daniela Chudá (Institute of Informatics and Software Engineering, Slovak University of Technology, Bratislava, Slovakia) and Peter Krátky (Institute of Informatics and Software Engineering, Slovak University of Technology, Bratislava, Slovakia)
DOI: 10.4018/ijhcitp.2015010104


Biometrics could be used to suppress impersonation in e-learning systems and thus to improve credibility of exams taken at home. Mouse usage characteristics are cheap and widely accessible alternative to other forms of biometrics reaching promising results in identity verification task. The paper provides preliminary results of cheating detection method based on mouse usage data gathered in an e-learning system. Mouse path is analyzed in deeper by decomposition to arcs and straight segments in order to study single-intent moves and to reveal curve characteristics. The paper also describes preliminary results of predicting learning styles of students according to the characteristics of computer mouse usage patterns for further recommendation of suitable materials.
Article Preview

Authentication using behavioural patterns like keystroke dynamics and computer mouse usage dynamics has been studied by number of researchers. The purpose of such methods is to improve security of password protected accounts. In general, scheme of authentication system includes gathering data of an authorizing user and comparing it with the user’s template model stored in a database in order to prove or reject his/her identity. We can recognize two types of authentication – static and dynamic. Static authentication is performed only at login time when he/she enters the code to unlock the account. For example, rhythm of typing the password is checked. Dynamic or continuous authentication is performed while the user works with the system, such as free text typing or various actions doing with the mouse.

Studied behavioural patterns generated by keyboard show decent performance in the terms of verification based on credentials typing (Joyce & Gupta, 1990; Chudá & Ďurfina, 2009; Shanmugapriya & Padmavathi, 2010) and even free text typing (Gunetti & Picardi, 2005).

Web-based applications (and e-learning systems with no exception) are controlled by computer mouse most of the time, so we put emphasis on this area of research. Research works in this field are aimed at continuous verification mostly. A basic method proposed in (Pusara & Brodley, 2004) embraces gathering of mouse events and calculating characteristics such as distance, duration and angle for a window of N points. In other works mouse events are organized into various high-level actions – strokes for bordered movement data (Gamboa & Fred, 2004), four common actions point & click, drag & drop, movement and silence (Ahmed & Traore, 2007) or more complex hierarchy of actions (Feher, 2012). Calculated characteristics for movement actions are based on distance, duration and angle between two consecutive points. Usually, the template model is represented by a feature vector, which holds values of the characteristics of aggregated actions. Classification whether the test model belongs to the user who claims his/her identity (or matches the trained template model) is mostly performed using decision trees (Pusara & Brodley, 2004; Feher, 2012), neural networks (Ahmed & Traore, 2007), SVM classifier (Mondal, 2012, Lin, 2012) or using statistical approach such as distribution comparison (Gamboa & Fred, 2004).

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2019): Forthcoming, Available for Pre-Order
Volume 9: 4 Issues (2018): 2 Released, 2 Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing