中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/44481
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 78852/78852 (100%)
造访人次 : 37842162      在线人数 : 470
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/44481


    题名: 利用指定功能軌跡的滑鼠特徵分析以提升識別率;A feasibility study on using mouse dynamics of a specific operation in a general application to improve the accuracy of user verification
    作者: 陳秋玉;Chiu-yu Chen
    贡献者: 軟體工程研究所
    关键词: 特徵萃取;滑鼠特徵;識別使用者;分類器;Mouse Dynamics;feature extraction;classifier;user verification
    日期: 2010-07-22
    上传时间: 2010-12-09 13:45:08 (UTC+8)
    出版者: 國立中央大學
    摘要: 由於多元化的資訊發展與環境,盜用他人的帳號密碼執行不合法的犯罪行為頻傳,顯示過去採取一次性登入(single sign-on)做為電腦系統安全認證的方式已經不敷使用。因此,許多學者分別提出以滑鼠操作軌跡(Trajectory)為基礎的辨識/識別技術做為輔助。目前主要區分成Histogram與Mouse Dynamics兩類技術。然而,Histogram的辨識/識別能力會受到應用程式與工作環境的影響。Mouse Dynamics的部分,則因為過去的軌跡樣本收集方式,一部份會中斷使用者的正常工作;另一部分則是大量收集各種軌跡資料,其內容複雜且經常包含無辨識能力或影響辨識/識別的雜訊問題。因此,本團隊提出收集—指定應用程式且指定功能—的滑鼠操作軌跡的方式以純化樣本資料並提高識別的準確率。In recent years, with the popularization of computer and network, the single sign-on approach of the tradition authentication mechanism may not enough to protect our cyber assets in the future since the illegal cybercrimes access is still on the increase. Consequently, many researchers propose a re-authentication concept that uses the mouse dynamics to verify the user's identity. At the present time, mouse trajectories were collected from all applications or a specified application (such as Internet Explorer) for implementing verification models. However, the mouse trajectories include many types of activity and noise that will affect the verification accuracy. Therefore, this thesis proposes a method that only obtains the specific mouse trajectories to category trajectories and to filter noise for improving the verification accuracy of the implemented models. To prove the proposed method, this thesis conducts experiments to compare the verification rate from three types of trajectories collection. The experiment results show that the accuracy of the proposed method is better than the others. The successful verification rate in our model is 94%. This thesis technique can be applied to existing environmental and upgrade computer security.
    显示于类别:[軟體工程研究所 ] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML1011检视/开启


    在NCUIR中所有的数据项都受到原著作权保护.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明