Abstract
It is relatively easier for an insider attacker to steal the password of a colleague or use an unattended machine (logged in by other users) within a trusted domain to launch an attack. A simple real-time authentication by password may not work if they have the password. By comparing the stored mouse behavioral profile of the valid user, the system automatically authenticates the user. However, long verification time in existing approaches based on mouse dynamics which mostly last dozens of minutes and probably make masquerader escaped from detection mechanism. In this paper, we proposed a system called PAITS (Practical Authentication with Identity Tracing System) to do re-authentication via comparison of mouse behavior under a short-lived interventional scenario. Mouse movements under the special scenario where the cursor is a bit out of control can capture the user’s unconscious reaction, and then be used for behavioral comparison and detection of malicious masquerader. Our experiments on PAITS demonstrate best result with a FRR of 2.86% and a FAR of 3.23% under probability neural network with 71 features. That is a comparative result against the previous research results, but at the same time significantly shorten the verification time from dozens of minutes to five seconds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.H., Brackney, R.: Understanding the insider threat. RAND Corporation (2004)
Chen, X., Fang, B., Tan, Q., et al.: Inferring attack intent of malicious insider based on probabilistic attack graph model. Chinese Journal of Computers 37(1), 62–72 (2014)
Hocquet, S., Ramel, J.Y., Cardot, H.: Users Authentic-ation by a Study of Human Computer Interactions. In: Proc. Eighth Ann. (Doctoral) Meeting on Health, Science and Technology (2004), http://www.univ-tours.fr/ed/edsst/comm2004/hocquet.pdf
Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM (October 2004)
Ahmed, A.A.E., Traore, I.: IEEE Transactions on A new biometric technology based on mouse dynamics. Dependable and Secure Computing 4(3), 165–179 (2007)
Gamboa, H., Fred, A.L.N., Jain, A.K.: Webbiometrics: user verification via web interaction. In: Biometrics Symposium 2007, pp. 1–6. IEEE (September 2007)
Quinlan, J.R.: C4. 5: Programs for machine learning (vol. 1). Morgan kaufmann (1993)
Rulequest. See5: An Informal Tutorial, http://www.rulequest.com/see5-win.html (August 25, 2014)
Freund, Y., Schapire, R.E.: A desicion-theoretic generalization of on-line learning and an application to boosting. In: Vitányi, P.M.B. (ed.) EuroCOLT 1995. LNCS, vol. 904, pp. 23–37. Springer, Heidelberg (1995)
Suykens, J.A., Vandewalle, J.: Least squares support vector machine classifiers. Neural processing letters 9(3), 293–300 (1999)
Specht, D.F.: Probabilistic neural networks. Neural Networks 3(1), 109–118 (1990)
FEAST. A Feature Selection Toolbox for C and Matlab, http://www.cs.man.ac.uk/~gbrown/fstoolbox/ (August 25, 2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, Xj., Shi, Jq., Xu, R., Yiu, S.M., Fang, Bx., Xu, F. (2014). PAITS: Detecting Masquerader via Short-Lived Interventional Mouse Dynamics. In: Batten, L., Li, G., Niu, W., Warren, M. (eds) Applications and Techniques in Information Security. ATIS 2014. Communications in Computer and Information Science, vol 490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45670-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-662-45670-5_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45669-9
Online ISBN: 978-3-662-45670-5
eBook Packages: Computer ScienceComputer Science (R0)