User identification via keystroke characteristics of typed names using neural networks
International Journal of Man-Machine Studies
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Discovery of Web Robot Sessions Based on their Navigational Patterns
Data Mining and Knowledge Discovery
Data mining tasks and methods: Classification: decision-tree discovery
Handbook of data mining and knowledge discovery
Toward Reliable User Authentication through Biometrics
IEEE Security and Privacy
Designing human friendly human interaction proofs (HIPs)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting browser state from web privacy attacks
Proceedings of the 15th international conference on World Wide Web
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Biometric authentication revisited: understanding the impact of wolves in sheep's clothing
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Securing web service by automatic robot detection
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
Detecting covert timing channels: an entropy-based approach
Proceedings of the 14th ACM conference on Computer and communications security
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
Trackback-Rank: An Effective Ranking Algorithm for the Blog Search
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
Web robot detection: A probabilistic reasoning approach
Computer Networks: The International Journal of Computer and Telecommunications Networking
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the 26th Annual Computer Security Applications Conference
Hi-index | 0.00 |
Blog bots are automated scripts or programs that post comments to blog sites, often including spam or other malicious links. An effective defense against the automatic form filling and posting from blog bots is to detect and validate the human presence. Conventional detection methods usually require direct participation of human users, such as recognizing a CAPTCHA image, which can be burdensome for users. In this paper, we present a new detection approach by using behavioral biometrics, primarily mouse and keystroke dynamics, to distinguish between human and bot. Based on passive monitoring, the proposed approach does not require any direct user participation. We collect real user input data from a very active online community and blog site, and use this data to characterize behavioral differences between human and bot. The most useful features for classification provide the basis for a detection system consisting of two main components: a webpage-embedded logger and a server-side classifier. The webpage-embedded logger records mouse movement and keystroke data while a user is filling out a form, and provides this data in batches to a server-side detector, which classifies the poster as human or bot. Our experimental results demonstrate an overall detection accuracy greater than 99%, with negligible overhead.