Skip to main content

Continuous User Verification via Mouse Activities

  • Conference paper
  • First Online:
Multimedia Communications, Services and Security (MCSS 2015)

Abstract

Behavioral biometrics such as mouse dynamics are gaining attention these days to address the limitations of conventional verification systems. In this paper we present a novel method to continuously verify a user via their mouse activities. Our method, based on comparing mouse activities against a simple statistical profile, was tested over 76,500 mouse activities collected from 45 users. A total of 354,375 genuine and impostor verification attempts have been performed by deploying 175 different verifier setups. In our experiments, we achieved an impressive low Equal Error Rate (EER) of 6.70 %. On average the EER was 13.42 %. We opine that, our method can complement regular verification systems and can better serve for continuous verification purpose because of its simplicity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shen, C., Cai, Z., Guan, Z., Du, Y., Maxion, Y.: User authentication through mouse dynamics. IEEE Trans. Inform. Forensic Secur. 8(1), 16–30 (2013)

    Article  Google Scholar 

  2. Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, pp. 476–482 (2011)

    Google Scholar 

  3. Schulz, D.: Mouse Curve Biometrics. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference (2006)

    Google Scholar 

  4. Pusara, M., Brodley, C.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security - VizSEC/DMSEC 2004 (2004)

    Google Scholar 

  5. Shen, C., Cai, Z., Guan, X., Sha, H., Du, J.: Feature analysis of mouse dynamics in identity authentication and monitoring. In: 2009 IEEE International Conference on Communications (2009)

    Google Scholar 

  6. Ahmed, A., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secure Comput. 4(3), 165–179 (2007)

    Article  Google Scholar 

  7. Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS 2011, pp. 139–150 (2011)

    Google Scholar 

  8. Nakkabi, Y., Traore, I., Ahmed, A.: Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Trans. Syst. Man Cybern. A 40(6), 1345–1353 (2010)

    Article  Google Scholar 

  9. Syukri, A.F., Okamoto, E., Mambo, M.: A user identification system using signature written with mouse. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 403–414. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Revett, K., Jahankhani, H., de Magalhães, S.T., Santos, H.M.D.: A survey of user authentication based on mouse dynamics. In: Jahankhani, H., Palmer-Brown, D., Revett, K. (eds.) Global E-Security. CCIS, vol. 12, pp. 210–219. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khandaker Abir Rahman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Rahman, K.A., Moormann, R., Dierich, D., Hossain, M.S. (2015). Continuous User Verification via Mouse Activities. In: Dziech, A., Leszczuk, M., Baran, R. (eds) Multimedia Communications, Services and Security. MCSS 2015. Communications in Computer and Information Science, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-319-26404-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26404-2_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26403-5

  • Online ISBN: 978-3-319-26404-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics