Skip to main content

PAITS: Detecting Masquerader via Short-Lived Interventional Mouse Dynamics

  • Conference paper
Applications and Techniques in Information Security (ATIS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 490))

  • 1526 Accesses

Abstract

It is relatively easier for an insider attacker to steal the password of a colleague or use an unattended machine (logged in by other users) within a trusted domain to launch an attack. A simple real-time authentication by password may not work if they have the password. By comparing the stored mouse behavioral profile of the valid user, the system automatically authenticates the user. However, long verification time in existing approaches based on mouse dynamics which mostly last dozens of minutes and probably make masquerader escaped from detection mechanism. In this paper, we proposed a system called PAITS (Practical Authentication with Identity Tracing System) to do re-authentication via comparison of mouse behavior under a short-lived interventional scenario. Mouse movements under the special scenario where the cursor is a bit out of control can capture the user’s unconscious reaction, and then be used for behavioral comparison and detection of malicious masquerader. Our experiments on PAITS demonstrate best result with a FRR of 2.86% and a FAR of 3.23% under probability neural network with 71 features. That is a comparative result against the previous research results, but at the same time significantly shorten the verification time from dozens of minutes to five seconds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.H., Brackney, R.: Understanding the insider threat. RAND Corporation (2004)

    Google Scholar 

  2. Chen, X., Fang, B., Tan, Q., et al.: Inferring attack intent of malicious insider based on probabilistic attack graph model. Chinese Journal of Computers 37(1), 62–72 (2014)

    Google Scholar 

  3. Hocquet, S., Ramel, J.Y., Cardot, H.: Users Authentic-ation by a Study of Human Computer Interactions. In: Proc. Eighth Ann. (Doctoral) Meeting on Health, Science and Technology (2004), http://www.univ-tours.fr/ed/edsst/comm2004/hocquet.pdf

  4. Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM (October 2004)

    Google Scholar 

  5. Ahmed, A.A.E., Traore, I.: IEEE Transactions on A new biometric technology based on mouse dynamics. Dependable and Secure Computing 4(3), 165–179 (2007)

    Article  Google Scholar 

  6. Gamboa, H., Fred, A.L.N., Jain, A.K.: Webbiometrics: user verification via web interaction. In: Biometrics Symposium 2007, pp. 1–6. IEEE (September 2007)

    Google Scholar 

  7. Quinlan, J.R.: C4. 5: Programs for machine learning (vol. 1). Morgan kaufmann (1993)

    Google Scholar 

  8. Rulequest. See5: An Informal Tutorial, http://www.rulequest.com/see5-win.html (August 25, 2014)

  9. Freund, Y., Schapire, R.E.: A desicion-theoretic generalization of on-line learning and an application to boosting. In: Vitányi, P.M.B. (ed.) EuroCOLT 1995. LNCS, vol. 904, pp. 23–37. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  10. Suykens, J.A., Vandewalle, J.: Least squares support vector machine classifiers. Neural processing letters 9(3), 293–300 (1999)

    Article  MathSciNet  Google Scholar 

  11. Specht, D.F.: Probabilistic neural networks. Neural Networks 3(1), 109–118 (1990)

    Article  Google Scholar 

  12. FEAST. A Feature Selection Toolbox for C and Matlab, http://www.cs.man.ac.uk/~gbrown/fstoolbox/ (August 25, 2014)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, Xj., Shi, Jq., Xu, R., Yiu, S.M., Fang, Bx., Xu, F. (2014). PAITS: Detecting Masquerader via Short-Lived Interventional Mouse Dynamics. In: Batten, L., Li, G., Niu, W., Warren, M. (eds) Applications and Techniques in Information Security. ATIS 2014. Communications in Computer and Information Science, vol 490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45670-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45670-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45669-9

  • Online ISBN: 978-3-662-45670-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics