IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Identity authentication based on keystroke latencies
Communications of the ACM
User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
FVC2000: Fingerprint Verification Competition
IEEE Transactions on Pattern Analysis and Machine Intelligence
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
A Motion Prediction Method for Mouse-Based Navigation
CGI '01 Computer Graphics International 2001
Toward Reliable User Authentication through Biometrics
IEEE Security and Privacy
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Gait recognition using wearable motion recording sensors
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Identity theft, computers and behavioral biometrics
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Multifactor authentication based on keystroke dynamics
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
A novel approach to design of user re-authentication systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Feature analysis of mouse dynamics in identity authentication and monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Cybermetrics: user identification through network flow analysis
AIMS'10 Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
On mouse dynamics as a behavioral biometric for authentication
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Homogeneous physio-behavioral visual and mouse-based biometric
ACM Transactions on Computer-Human Interaction (TOCHI)
An efficient user verification system via mouse movements
Proceedings of the 18th ACM conference on Computer and communications security
Dynamic sample size detection in continuous authentication using sequential sampling
Proceedings of the 27th Annual Computer Security Applications Conference
Poster: can it be more practical?: improving mouse dynamics biometric performance
Proceedings of the 18th ACM conference on Computer and communications security
User identity verification via mouse dynamics
Information Sciences: an International Journal
A personal touch: recognizing users based on touch screen behavior
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
In this paper we introduce a new form of behavioral biometrics based on mouse dynamics, which can be used indifferent security applications. We develop a technique that can be used to model the behavioral characteristics from the captured data using artificial neural networks. In addition, we present an architecture and implementation for the detector, which cover all the phases of the biometric data flow including the detection process. Experimental data illustrating the experiments conducted to evaluate the accuracy of the proposed detection technique are presented and analyzed. Specifically, three series of experiments are conducted. The main experiment, in which twenty-two participants are involved, reproduces real operating conditions in computing systems by giving participants an individual choice of operating environments and applications; 284 hours of raw mouse data are collected over 998 sessions, with an average of 45 sessions per user. The two other experiments, involving seven participants, provided a basis for studying the confounding factors arising from the main experiment by fixing the environment variables. In the main experiment, the performance results presented using receiver operating characteristic(ROC) curves and a confusion matrix yield at the crossover point (i.e., threshold set for an equal error rate) a false acceptance rate (FAR) of 2.4649% and a false rejection rate (FRR) of 2.4614%.