User identity verification via mouse dynamics

  • Authors:
  • Clint Feher;Yuval Elovici;Robert Moskovitch;Lior Rokach;Alon Schclar

  • Affiliations:
  • Telekom Innovation Laboratories at Ben-Gurion University and Department of Information Systems Engineering, Ben-Gurion University, POB 653, Beer Sheva 84105, Israel;Telekom Innovation Laboratories at Ben-Gurion University and Department of Information Systems Engineering, Ben-Gurion University, POB 653, Beer Sheva 84105, Israel;Telekom Innovation Laboratories at Ben-Gurion University and Department of Information Systems Engineering, Ben-Gurion University, POB 653, Beer Sheva 84105, Israel;College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802, USA;School of Computer Science, Academic College of Tel-Aviv, POB 8401, Tel Aviv 61083, Israel

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2012

Quantified Score

Hi-index 0.07

Visualization

Abstract

Identity theft is a crime in which hackers perpetrate fraudulent activity under stolen identities by using credentials, such as passwords and smartcards, unlawfully obtained from legitimate users or by using logged-on computers that are left unattended. User verification methods provide a security layer in addition to the username and password by continuously validating the identity of logged-on users based on their physiological and behavioral characteristics. We introduce a novel method that continuously verifies users according to characteristics of their interaction with the mouse. The contribution of this work is threefold: first, user verification is derived based on the classification results of each individual mouse action, in contrast to methods which aggregate mouse actions. Second, we propose a hierarchy of mouse actions from which the features are extracted. Third, we introduce new features to characterize the mouse activity which are used in conjunction with features proposed in previous work. The proposed algorithm outperforms current state-of-the-art methods by achieving higher verification accuracy while reducing the response time of the system.