Abstract
The article concerns behavioral biometrics, where issues related to computer user verification based on analysis of the mouse activity in computer system are particularly studied. The work is devoted to the analysis of user activity in environments with a graphical user interface (GUI). The set of analyzed features is extended by introducing new features to characterize the mouse activity. A new method of aggregating the mouse activity basic events into a higher level events is presented. Additionally, an attempt to intrusion detection based on the k-NN classifier and various distance metrics is performed.
This article presents the preliminary research and conclusions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, A.: User Profiling in GUI Based Windows Systems for Intrusion Detection, Master’s Projects, Paper 303 (2013)
Ahmed, A.A.E., Traore, I.: A New Biometric Technology Based on Mouse Dynamics. IEEE Transactions on Dependable and Secure Computing 4(3), 165–179 (2007)
Banerjee, S.P., Woodard, D.L.: Biometric Authentication and Identification Using Keystroke Dynamics: A survey. J. of Pattern Recognition Research 7, 116–139 (2012)
Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User Identity Verification via Mouse Dynamics. Information Sciences 201, 19–36 (2012)
Gamboa, H., Fred, A.: A Behavioral Biometric System Based on Human Computer Interaction. Biometric Technology for Human Identification, 381–392 (2004)
Garg, A., Rahalkar, R., Upadhyaya, S., Kwiat, K.: Profiling Users in GUI Based Systems for Masquerade Detection. In: Proc. of the 7th IEEE Workshop on Information Assurance, pp. 48–54 (2006)
Hsing-Kuo, P., Junaidillah, F., Hong-Yi, L., Kuan-Ta, C.: Trajectory analysis for user verification and recognition. Knowledge-Based Systems 34, 81–90 (2012)
Kaminsky, R., Enev, M., Andersen, E.: Identifying Game Players with Mouse Biometrics, University of Washington, Technical Report (2008)
Palys, M., Doroz, R., Porwik, P.: On-line signature recognition based on an analysis of dynamic feature. In: IEEE Int. Conf. on Biometrics and Kansei Engineering, pp. 103–107. Metropolitan University Akihabara, Tokyo (2013)
Porwik, P., Sosnowski, M., Wesolowski, T., Wrobel, K.: A computational assessment of a blood vessel’s compliance: A procedure based on computed tomography coronary angiography. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS, vol. 6678, pp. 428–435. Springer, Heidelberg (2011)
Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8 (2004)
Raiyn, J.: A survey of cyber attack detection strategies. International Journal of Security and Its Applications 8(1), 247–256 (2014)
Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. Advances in Information Security, vol. 39, pp. 69–90. Springer, US (2008)
Schonlau, M.: Masquerading user data, http://www.schonlau.net
Wesolowski, T., Kudlacik, P.: Data clustering for the block profile method of intruder detection. J. of MIT 22, 209–216 (2013)
Wesolowski, T., Kudlacik, P.: User profiling based on multiple aspects of activity in a computer system. J. of MIT 23, 121–129 (2014)
Wesolowski, T., Wrobel, K.: A computational assessment of a blood vessel’s roughness. In: Burduk, R., Jackowski, K., Kurzynski, M., Wozniak, M., Zolnierek, A. (eds.) CORES 2013. AISC, vol. 226, pp. 231–240. Springer, Heidelberg (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wesolowski, T., Palys, M., Kudlacik, P. (2015). Computer User Verification Based on Mouse Activity Analysis. In: Barbucha, D., Nguyen, N., Batubara, J. (eds) New Trends in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 598. Springer, Cham. https://doi.org/10.1007/978-3-319-16211-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-16211-9_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16210-2
Online ISBN: 978-3-319-16211-9
eBook Packages: EngineeringEngineering (R0)