English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 78852/78852 (100%)
造訪人次 : 37840185      線上人數 : 551
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/44481


    題名: 利用指定功能軌跡的滑鼠特徵分析以提升識別率;A feasibility study on using mouse dynamics of a specific operation in a general application to improve the accuracy of user verification
    作者: 陳秋玉;Chiu-yu Chen
    貢獻者: 軟體工程研究所
    關鍵詞: 特徵萃取;滑鼠特徵;識別使用者;分類器;Mouse Dynamics;feature extraction;classifier;user verification
    日期: 2010-07-22
    上傳時間: 2010-12-09 13:45:08 (UTC+8)
    出版者: 國立中央大學
    摘要: 由於多元化的資訊發展與環境,盜用他人的帳號密碼執行不合法的犯罪行為頻傳,顯示過去採取一次性登入(single sign-on)做為電腦系統安全認證的方式已經不敷使用。因此,許多學者分別提出以滑鼠操作軌跡(Trajectory)為基礎的辨識/識別技術做為輔助。目前主要區分成Histogram與Mouse Dynamics兩類技術。然而,Histogram的辨識/識別能力會受到應用程式與工作環境的影響。Mouse Dynamics的部分,則因為過去的軌跡樣本收集方式,一部份會中斷使用者的正常工作;另一部分則是大量收集各種軌跡資料,其內容複雜且經常包含無辨識能力或影響辨識/識別的雜訊問題。因此,本團隊提出收集—指定應用程式且指定功能—的滑鼠操作軌跡的方式以純化樣本資料並提高識別的準確率。In recent years, with the popularization of computer and network, the single sign-on approach of the tradition authentication mechanism may not enough to protect our cyber assets in the future since the illegal cybercrimes access is still on the increase. Consequently, many researchers propose a re-authentication concept that uses the mouse dynamics to verify the user's identity. At the present time, mouse trajectories were collected from all applications or a specified application (such as Internet Explorer) for implementing verification models. However, the mouse trajectories include many types of activity and noise that will affect the verification accuracy. Therefore, this thesis proposes a method that only obtains the specific mouse trajectories to category trajectories and to filter noise for improving the verification accuracy of the implemented models. To prove the proposed method, this thesis conducts experiments to compare the verification rate from three types of trajectories collection. The experiment results show that the accuracy of the proposed method is better than the others. The successful verification rate in our model is 94%. This thesis technique can be applied to existing environmental and upgrade computer security.
    顯示於類別:[軟體工程研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML1011檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明