Stimuli for Gaze Based Intrusion Detection View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012-06-05

AUTHORS

Ralf Biedert , Mario Frank , Ivan Martinovic , Dawn Song

ABSTRACT

User authentication is an important and usually final barrier to detect and prevent illicit access. Nonetheless it can be broken or tricked, leaving the system and its data vulnerable to abuse. In this paper we consider how eye tracking can enable the system to hypothesize if the user is familiar with the system he operates, or if he is an unfamiliar intruder. Based on an eye tracking experiment conducted with 12 users and various stimuli, we investigate which conditions and measures are most suited for such an intrusion detection. We model the user’s gaze behavior as a selector for information flow via the relative conditional gaze entropy. We conclude that this feature provides the most discriminative results with static and repetitive stimuli. More... »

PAGES

757-763

Book

TITLE

Future Information Technology, Application, and Service

ISBN

978-94-007-4515-5
978-94-007-4516-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-94-007-4516-2_80

DOI

http://dx.doi.org/10.1007/978-94-007-4516-2_80

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1013484116


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of California, Berkeley, USA", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California, Berkeley, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Biedert", 
        "givenName": "Ralf", 
        "id": "sg:person.014750346647.17", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014750346647.17"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California, Berkeley, USA", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California, Berkeley, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Frank", 
        "givenName": "Mario", 
        "id": "sg:person.012211067635.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012211067635.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Oxford, Oxford, UK", 
          "id": "http://www.grid.ac/institutes/grid.4991.5", 
          "name": [
            "University of Oxford, Oxford, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Martinovic", 
        "givenName": "Ivan", 
        "id": "sg:person.015515650557.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015515650557.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California, Berkeley, USA", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California, Berkeley, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Song", 
        "givenName": "Dawn", 
        "id": "sg:person.01143152610.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012-06-05", 
    "datePublishedReg": "2012-06-05", 
    "description": "User authentication is an important and usually final barrier to detect and prevent illicit access. Nonetheless it can be broken or tricked, leaving the system and its data vulnerable to abuse. In this paper we consider how eye tracking can enable the system to hypothesize if the user is familiar with the system he operates, or if he is an unfamiliar intruder. Based on an eye tracking experiment conducted with 12 users and various stimuli, we investigate which conditions and measures are most suited for such an intrusion detection. We model the user\u2019s gaze behavior as a selector for information flow via the relative conditional gaze entropy. We conclude that this feature provides the most discriminative results with static and repetitive stimuli.", 
    "editor": [
      {
        "familyName": "J. Park", 
        "givenName": "James", 
        "type": "Person"
      }, 
      {
        "familyName": "Leung", 
        "givenName": "Victor C.M.", 
        "type": "Person"
      }, 
      {
        "familyName": "Wang", 
        "givenName": "Cho-Li", 
        "type": "Person"
      }, 
      {
        "familyName": "Shon", 
        "givenName": "Taeshik", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-94-007-4516-2_80", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-94-007-4515-5", 
        "978-94-007-4516-2"
      ], 
      "name": "Future Information Technology, Application, and Service", 
      "type": "Book"
    }, 
    "keywords": [
      "intrusion detection", 
      "user's gaze behavior", 
      "user authentication", 
      "gaze behavior", 
      "illicit access", 
      "information flow", 
      "eye tracking experiment", 
      "eye tracking", 
      "users", 
      "tracking experiments", 
      "authentication", 
      "intruders", 
      "system", 
      "tracking", 
      "detection", 
      "discriminative results", 
      "access", 
      "features", 
      "gaze", 
      "selector", 
      "data", 
      "experiments", 
      "results", 
      "measures", 
      "behavior", 
      "flow", 
      "final barrier", 
      "unfamiliar intruders", 
      "barriers", 
      "conditions", 
      "stimuli", 
      "abuse", 
      "repetitive stimuli", 
      "paper"
    ], 
    "name": "Stimuli for Gaze Based Intrusion Detection", 
    "pagination": "757-763", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1013484116"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-94-007-4516-2_80"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-94-007-4516-2_80", 
      "https://app.dimensions.ai/details/publication/pub.1013484116"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:39", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_156.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-94-007-4516-2_80"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-94-007-4516-2_80'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-94-007-4516-2_80'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-94-007-4516-2_80'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-94-007-4516-2_80'


 

This table displays all metadata directly associated to this object as RDF triples.

133 TRIPLES      23 PREDICATES      59 URIs      52 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-94-007-4516-2_80 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Ncfbbaa740fdb4ead998c7b7f7c0ca6c1
4 schema:datePublished 2012-06-05
5 schema:datePublishedReg 2012-06-05
6 schema:description User authentication is an important and usually final barrier to detect and prevent illicit access. Nonetheless it can be broken or tricked, leaving the system and its data vulnerable to abuse. In this paper we consider how eye tracking can enable the system to hypothesize if the user is familiar with the system he operates, or if he is an unfamiliar intruder. Based on an eye tracking experiment conducted with 12 users and various stimuli, we investigate which conditions and measures are most suited for such an intrusion detection. We model the user’s gaze behavior as a selector for information flow via the relative conditional gaze entropy. We conclude that this feature provides the most discriminative results with static and repetitive stimuli.
7 schema:editor Nb79dcffe59fd43bdb3af59a087f9f4ee
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N292fd2a1154d474984ccd08e3255a4e2
12 schema:keywords abuse
13 access
14 authentication
15 barriers
16 behavior
17 conditions
18 data
19 detection
20 discriminative results
21 experiments
22 eye tracking
23 eye tracking experiment
24 features
25 final barrier
26 flow
27 gaze
28 gaze behavior
29 illicit access
30 information flow
31 intruders
32 intrusion detection
33 measures
34 paper
35 repetitive stimuli
36 results
37 selector
38 stimuli
39 system
40 tracking
41 tracking experiments
42 unfamiliar intruders
43 user authentication
44 user's gaze behavior
45 users
46 schema:name Stimuli for Gaze Based Intrusion Detection
47 schema:pagination 757-763
48 schema:productId N35ab40c6c1df46fea702bc286403215c
49 Nae78b1b7cead4b07a3805ffd4ab65a5e
50 schema:publisher N5d97aff914f841cabbf59dd3d41b9729
51 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013484116
52 https://doi.org/10.1007/978-94-007-4516-2_80
53 schema:sdDatePublished 2022-05-10T10:39
54 schema:sdLicense https://scigraph.springernature.com/explorer/license/
55 schema:sdPublisher Nfd59daf33fda4de692cc8cae0003193c
56 schema:url https://doi.org/10.1007/978-94-007-4516-2_80
57 sgo:license sg:explorer/license/
58 sgo:sdDataset chapters
59 rdf:type schema:Chapter
60 N220d669873ac44bfa891e6ff10efc43b rdf:first sg:person.015515650557.53
61 rdf:rest N8dcd460918c94b44a57a6b079fdc65ca
62 N292fd2a1154d474984ccd08e3255a4e2 schema:isbn 978-94-007-4515-5
63 978-94-007-4516-2
64 schema:name Future Information Technology, Application, and Service
65 rdf:type schema:Book
66 N295f4ba885164ec6aa5436685c1e770c schema:familyName Shon
67 schema:givenName Taeshik
68 rdf:type schema:Person
69 N35ab40c6c1df46fea702bc286403215c schema:name doi
70 schema:value 10.1007/978-94-007-4516-2_80
71 rdf:type schema:PropertyValue
72 N3665554cda8844f9990adf9a5c943770 rdf:first sg:person.012211067635.94
73 rdf:rest N220d669873ac44bfa891e6ff10efc43b
74 N4cc9c55808c64ca2a1c993105c77ead4 schema:familyName Leung
75 schema:givenName Victor C.M.
76 rdf:type schema:Person
77 N5d97aff914f841cabbf59dd3d41b9729 schema:name Springer Nature
78 rdf:type schema:Organisation
79 N7930c669907c4aa49bfc1a494b15f78d rdf:first N4cc9c55808c64ca2a1c993105c77ead4
80 rdf:rest Nb1a9dbd5685c4ffaa67072c484c7de1c
81 N8dcd460918c94b44a57a6b079fdc65ca rdf:first sg:person.01143152610.86
82 rdf:rest rdf:nil
83 Na96a529fb1b74cb192620bf006990a6c rdf:first N295f4ba885164ec6aa5436685c1e770c
84 rdf:rest rdf:nil
85 Nae78b1b7cead4b07a3805ffd4ab65a5e schema:name dimensions_id
86 schema:value pub.1013484116
87 rdf:type schema:PropertyValue
88 Nb1a9dbd5685c4ffaa67072c484c7de1c rdf:first Nf85e695384fc4516b0dc67b9184ba54b
89 rdf:rest Na96a529fb1b74cb192620bf006990a6c
90 Nb79dcffe59fd43bdb3af59a087f9f4ee rdf:first Nde4e26d7d20e41668fdfcc8c2b5d9f9a
91 rdf:rest N7930c669907c4aa49bfc1a494b15f78d
92 Ncfbbaa740fdb4ead998c7b7f7c0ca6c1 rdf:first sg:person.014750346647.17
93 rdf:rest N3665554cda8844f9990adf9a5c943770
94 Nde4e26d7d20e41668fdfcc8c2b5d9f9a schema:familyName J. Park
95 schema:givenName James
96 rdf:type schema:Person
97 Nf85e695384fc4516b0dc67b9184ba54b schema:familyName Wang
98 schema:givenName Cho-Li
99 rdf:type schema:Person
100 Nfd59daf33fda4de692cc8cae0003193c schema:name Springer Nature - SN SciGraph project
101 rdf:type schema:Organization
102 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
103 schema:name Information and Computing Sciences
104 rdf:type schema:DefinedTerm
105 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information Systems
107 rdf:type schema:DefinedTerm
108 sg:person.01143152610.86 schema:affiliation grid-institutes:grid.47840.3f
109 schema:familyName Song
110 schema:givenName Dawn
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86
112 rdf:type schema:Person
113 sg:person.012211067635.94 schema:affiliation grid-institutes:grid.47840.3f
114 schema:familyName Frank
115 schema:givenName Mario
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012211067635.94
117 rdf:type schema:Person
118 sg:person.014750346647.17 schema:affiliation grid-institutes:grid.47840.3f
119 schema:familyName Biedert
120 schema:givenName Ralf
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014750346647.17
122 rdf:type schema:Person
123 sg:person.015515650557.53 schema:affiliation grid-institutes:grid.4991.5
124 schema:familyName Martinovic
125 schema:givenName Ivan
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015515650557.53
127 rdf:type schema:Person
128 grid-institutes:grid.47840.3f schema:alternateName University of California, Berkeley, USA
129 schema:name University of California, Berkeley, USA
130 rdf:type schema:Organization
131 grid-institutes:grid.4991.5 schema:alternateName University of Oxford, Oxford, UK
132 schema:name University of Oxford, Oxford, UK
133 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...