Abstract
Behavioral biometrics such as mouse dynamics are gaining attention these days to address the limitations of conventional verification systems. In this paper we present a novel method to continuously verify a user via their mouse activities. Our method, based on comparing mouse activities against a simple statistical profile, was tested over 76,500 mouse activities collected from 45 users. A total of 354,375 genuine and impostor verification attempts have been performed by deploying 175 different verifier setups. In our experiments, we achieved an impressive low Equal Error Rate (EER) of 6.70 %. On average the EER was 13.42 %. We opine that, our method can complement regular verification systems and can better serve for continuous verification purpose because of its simplicity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shen, C., Cai, Z., Guan, Z., Du, Y., Maxion, Y.: User authentication through mouse dynamics. IEEE Trans. Inform. Forensic Secur. 8(1), 16–30 (2013)
Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, pp. 476–482 (2011)
Schulz, D.: Mouse Curve Biometrics. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference (2006)
Pusara, M., Brodley, C.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security - VizSEC/DMSEC 2004 (2004)
Shen, C., Cai, Z., Guan, X., Sha, H., Du, J.: Feature analysis of mouse dynamics in identity authentication and monitoring. In: 2009 IEEE International Conference on Communications (2009)
Ahmed, A., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secure Comput. 4(3), 165–179 (2007)
Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS 2011, pp. 139–150 (2011)
Nakkabi, Y., Traore, I., Ahmed, A.: Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Trans. Syst. Man Cybern. A 40(6), 1345–1353 (2010)
Syukri, A.F., Okamoto, E., Mambo, M.: A user identification system using signature written with mouse. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 403–414. Springer, Heidelberg (1998)
Revett, K., Jahankhani, H., de Magalhães, S.T., Santos, H.M.D.: A survey of user authentication based on mouse dynamics. In: Jahankhani, H., Palmer-Brown, D., Revett, K. (eds.) Global E-Security. CCIS, vol. 12, pp. 210–219. Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Rahman, K.A., Moormann, R., Dierich, D., Hossain, M.S. (2015). Continuous User Verification via Mouse Activities. In: Dziech, A., Leszczuk, M., Baran, R. (eds) Multimedia Communications, Services and Security. MCSS 2015. Communications in Computer and Information Science, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-319-26404-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-26404-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26403-5
Online ISBN: 978-3-319-26404-2
eBook Packages: Computer ScienceComputer Science (R0)