Nothing Special   »   [go: up one dir, main page]

Skip to main content

Computer User Verification Based on Mouse Activity Analysis

  • Conference paper
New Trends in Intelligent Information and Database Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 598))

Abstract

The article concerns behavioral biometrics, where issues related to computer user verification based on analysis of the mouse activity in computer system are particularly studied. The work is devoted to the analysis of user activity in environments with a graphical user interface (GUI). The set of analyzed features is extended by introducing new features to characterize the mouse activity. A new method of aggregating the mouse activity basic events into a higher level events is presented. Additionally, an attempt to intrusion detection based on the k-NN classifier and various distance metrics is performed.

This article presents the preliminary research and conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Agrawal, A.: User Profiling in GUI Based Windows Systems for Intrusion Detection, Master’s Projects, Paper 303 (2013)

    Google Scholar 

  2. Ahmed, A.A.E., Traore, I.: A New Biometric Technology Based on Mouse Dynamics. IEEE Transactions on Dependable and Secure Computing 4(3), 165–179 (2007)

    Article  Google Scholar 

  3. Banerjee, S.P., Woodard, D.L.: Biometric Authentication and Identification Using Keystroke Dynamics: A survey. J. of Pattern Recognition Research 7, 116–139 (2012)

    Article  Google Scholar 

  4. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User Identity Verification via Mouse Dynamics. Information Sciences 201, 19–36 (2012)

    Article  Google Scholar 

  5. Gamboa, H., Fred, A.: A Behavioral Biometric System Based on Human Computer Interaction. Biometric Technology for Human Identification, 381–392 (2004)

    Google Scholar 

  6. Garg, A., Rahalkar, R., Upadhyaya, S., Kwiat, K.: Profiling Users in GUI Based Systems for Masquerade Detection. In: Proc. of the 7th IEEE Workshop on Information Assurance, pp. 48–54 (2006)

    Google Scholar 

  7. Hsing-Kuo, P., Junaidillah, F., Hong-Yi, L., Kuan-Ta, C.: Trajectory analysis for user verification and recognition. Knowledge-Based Systems 34, 81–90 (2012)

    Article  Google Scholar 

  8. Kaminsky, R., Enev, M., Andersen, E.: Identifying Game Players with Mouse Biometrics, University of Washington, Technical Report (2008)

    Google Scholar 

  9. Palys, M., Doroz, R., Porwik, P.: On-line signature recognition based on an analysis of dynamic feature. In: IEEE Int. Conf. on Biometrics and Kansei Engineering, pp. 103–107. Metropolitan University Akihabara, Tokyo (2013)

    Google Scholar 

  10. Porwik, P., Sosnowski, M., Wesolowski, T., Wrobel, K.: A computational assessment of a blood vessel’s compliance: A procedure based on computed tomography coronary angiography. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS, vol. 6678, pp. 428–435. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8 (2004)

    Google Scholar 

  12. Raiyn, J.: A survey of cyber attack detection strategies. International Journal of Security and Its Applications 8(1), 247–256 (2014)

    Article  Google Scholar 

  13. Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. Advances in Information Security, vol. 39, pp. 69–90. Springer, US (2008)

    Google Scholar 

  14. Schonlau, M.: Masquerading user data, http://www.schonlau.net

  15. Wesolowski, T., Kudlacik, P.: Data clustering for the block profile method of intruder detection. J. of MIT 22, 209–216 (2013)

    Google Scholar 

  16. Wesolowski, T., Kudlacik, P.: User profiling based on multiple aspects of activity in a computer system. J. of MIT 23, 121–129 (2014)

    Google Scholar 

  17. Wesolowski, T., Wrobel, K.: A computational assessment of a blood vessel’s roughness. In: Burduk, R., Jackowski, K., Kurzynski, M., Wozniak, M., Zolnierek, A. (eds.) CORES 2013. AISC, vol. 226, pp. 231–240. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomasz Wesolowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wesolowski, T., Palys, M., Kudlacik, P. (2015). Computer User Verification Based on Mouse Activity Analysis. In: Barbucha, D., Nguyen, N., Batubara, J. (eds) New Trends in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 598. Springer, Cham. https://doi.org/10.1007/978-3-319-16211-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16211-9_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16210-2

  • Online ISBN: 978-3-319-16211-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics