IEEE Transactions on Software Engineering - Special issue on computer security and privacy
C4.5: programs for machine learning
C4.5: programs for machine learning
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Boosting a weak learning algorithm by majority
Information and Computation
Communications of the ACM
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Characterizing the behavior of a program using multiple-length N-grams
Proceedings of the 2000 workshop on New security paradigms
Support vector machines: hype or hallelujah?
ACM SIGKDD Explorations Newsletter - Special issue on “Scalable data mining algorithms”
Profile-directed optimization of event-based programs
PLDI '02 Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Enhancing profiles for anomaly detection using time granularities
Journal of Computer Security
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
A Brief Introduction to Boosting
IJCAI '99 Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence
Learning Program Behavior Profiles for Intrusion Detection
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
ADMIT: anomaly-based data mining for intrusions
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Intrusion Detection Applying Machine Learning to Solaris Audit Data
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Anomaly Detection Using Call Stack Information
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Protecting unattended computers without software
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Intrusion Detection via Static Analysis
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Intrusion Detection: A Bioinformatics Approach
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Intrusion detection using sequences of system calls
Journal of Computer Security
A comparison of methods for multiclass support vector machines
IEEE Transactions on Neural Networks
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
User identification based on game-play activity patterns
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Impact of daily computer usage on GUI usage analysis
Proceedings of the 4th annual conference on Information security curriculum development
User Identification Based on Handwritten Signatures with Haptic Information
EuroHaptics '08 Proceedings of the 6th international conference on Haptics: Perception, Devices and Scenarios
Implicit User Re-authentication for Mobile Devices
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Automated stress detection using keystroke and linguistic features: An exploratory study
International Journal of Human-Computer Studies
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Identity theft, computers and behavioral biometrics
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
A novel approach to design of user re-authentication systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Masquerade detection based upon GUI user profiling in linux systems
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Feature analysis of mouse dynamics in identity authentication and monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privilege states based access control for fine-grained intrusion response
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
On mouse dynamics as a behavioral biometric for authentication
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Homogeneous physio-behavioral visual and mouse-based biometric
ACM Transactions on Computer-Human Interaction (TOCHI)
An efficient user verification system via mouse movements
Proceedings of the 18th ACM conference on Computer and communications security
Dynamic sample size detection in continuous authentication using sequential sampling
Proceedings of the 27th Annual Computer Security Applications Conference
Poster: can it be more practical?: improving mouse dynamics biometric performance
Proceedings of the 18th ACM conference on Computer and communications security
Intrusion detection via analysis and modelling of user commands
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
User modelling for exclusion and anomaly detection: a behavioural intrusion detection system
UMAP'10 Proceedings of the 18th international conference on User Modeling, Adaptation, and Personalization
Investigative behavior profiling with one class SVM for computer forensics
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
User identity verification via mouse dynamics
Information Sciences: an International Journal
Layered security architecture for masquerade attack detection
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Supporting children's web search in school environments
Proceedings of the 4th Information Interaction in Context Symposium
A proposed model for data warehouse user behaviour using intrusion detection system
ACM SIGSOFT Software Engineering Notes
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
We present an approach to user re-authentication based on the data collected from the computer's mouse device. Our underlying hypothesis is that one can successfully model user behavior on the basis of user-invoked mouse movements. Our implemented system raises an alarm when the current behavior of user X, deviates sufficiently from learned "normal" behavior of user X. We apply a supervised learning method to discriminate among k users. Our empirical results for eleven users show that we can differentiate these individuals based on their mouse movement behavior with a false positive rate of 0.43% and a false negative rate of 1.75%. Nevertheless, we point out that analyzing mouse movements alone is not sufficient for a stand-alone user re-authentication system.