skip to main content
10.1145/1029208.1029210acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

User re-authentication via mouse movements

Published:29 October 2004Publication History

ABSTRACT

We present an approach to user re-authentication based on the data collected from the computer's mouse device. Our underlying hypothesis is that one can successfully model user behavior on the basis of user-invoked mouse movements. Our implemented system raises an alarm when the current behavior of user X, deviates sufficiently from learned "normal" behavior of user X. We apply a supervised learning method to discriminate among k users. Our empirical results for eleven users show that we can differentiate these individuals based on their mouse movement behavior with a false positive rate of 0.43% and a false negative rate of 1.75%. Nevertheless, we point out that analyzing mouse movements alone is not sufficient for a stand-alone user re-authentication system.

References

  1. S. Axelsson. On a difficulty of intrusion detection. In Proceedings of the Recent Advances in Intrusion Detection Conference, 1999.]]Google ScholarGoogle Scholar
  2. K. Bennett and C. Campbell. Support vector machines: Hype or hallelujah? SIGKDD Explorations, 2:1--13, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. U. B. Consortium. "Face recognition". www.vitro.bloomington.in.us: 8080/ BC, 2004.]]Google ScholarGoogle Scholar
  4. S. Coull, J. Branch, B. Szymanski, and E. Breimer. "Intrusion detection: A bioinformatics approach". In Proceedings of the Nineteenth Annual Computer Security Applications Conference, pages 24--34, Las Vegas, NE, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. G. Daugman. "High confidence visual recognition of persons by a test of statistical independence". In Proceedings of the IEEE Transactions on Pattern Analysis and Machine Intelligence, volume 15, pages 1148--1161, November 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. E. Denning. "An intrusion-detection model". IEEE Transactions on Software Engineering, 13(2):222--232, 1987.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. E. Denning and P. G. Neumann. "Requirements and model for IDES - A real-time intrusion detection system". Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1985.]]Google ScholarGoogle Scholar
  8. D. Endler. "Intrusion detection applying machine learning to Solaris audit data". In Proceedings of the Computer Security Applications Conference, pages 268--279, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. "Anomaly detection using call stack information". In Proceedings of IEEE Symposium on Security and Privacy, pages 62--78, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Forrest, S. A. Hofmeyr, and A. Somayaji. "Computer immunology". Communications of the ACM, 40(10):88--96, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Freund. Boosting a Weak Learning Algorithm by Majority. Information and Computation, 121(2):256--285, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Gear. "Voice recognition solutions". www.transcriptiongear.com, 2004.]]Google ScholarGoogle Scholar
  13. A. K. Ghosh, A. Schwartzbard, and M. Schatz. "Learning program behavior profiles for intrusion detection". In Proceedings of the First USENIX Workshop on Intrusion Detection and Network Monitoring, pages 51--62, April 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Goecks and J. Shavlik. "Automatically labeling web pages based on normal user actions". In Procedings of the IJCAI Workshop on Machine Learning for Information Filtering, July 1999.]]Google ScholarGoogle Scholar
  15. S. A. Hofmeyr, S. Forrest, and A. Somayaji. "Intrusion detection using sequences of system calls". Journal of Computer Security, 6(3):151--180, 1998.]] Google ScholarGoogle ScholarCross RefCross Ref
  16. C. Hsu and C. Lin. "A comparison of methods for multi-class support vector machines". IEEE Transactions on Neural Networks, 13:415--425, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. HTT. "Access control". www.htt.com, 2004.]]Google ScholarGoogle Scholar
  18. K. Ilgun, R. A. Kemmerer, and P. A. Porras. "State transition analysis: A rule-based intrusion detection approach". Software Engineering, 21(3):181--199, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Ko, G. Fink, and K. Levitt. "Automated detection of vulnerabilities in priviledged programs by execution monitoring". In Proceedings of the Tenth Annual Computer Security Applications Conference, pages 134--144, December 1994.]]Google ScholarGoogle ScholarCross RefCross Ref
  20. C. E. Landwehr. "Protecting unattended computers without software". In Proceedings of the 13th Annual Computer Security Applications Conference, pages 273--283, December 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. T. Lane and C. E. Brodley. "Temporal sequence learning and data reduction for anomaly detection". ACM Transactions on Information and System Security, 2(3):295--331, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. Lee, S. J. Stolfo, and K. W. Mok. "A data mining framework for building intrusion detection models". In Proceedings of the IEEE Symposium on Security and Privacy, pages 120--132, 1999.]]Google ScholarGoogle Scholar
  23. Y. Li, N. Wu, S. Jajodia, and X. S. Wang. "Enhancing profiles for anomaly detection using time granularities". Journal of Computer Security, 10(2):137--157, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. G. Neumann, H. S. Javitz, A. Valdes, and T. D. Garvey. "A real-time intrusion detection expert system IDES - Final report". Technical Report SRI-CSL-92-05, SRI Computer Science Laboratory, SRI International, February 1992.]]Google ScholarGoogle Scholar
  25. C. Marceau. "Characterizing the behavior of a program using multiple-length N-grams". In Proceedings of the 2000 Workshop on New Security Paradigms, pages 101--110. ACM Press, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. A. Marin, D. Ragsdale, and J. Surdu. "A hybrid approach to profile creation and intrusion detection". In Proceedings of DARPA Information Survivability Conference and Exposition, pages 12--14, June 2001.]]Google ScholarGoogle ScholarCross RefCross Ref
  27. C. Michael and A. Ghosh. "Using finite automata to mine execution data for intrusion detection: A preliminary report". Lecture Notes in Computer Science, 1907:66--80, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. F. Monrose and A. Rubin. "Authentication via keystroke dynamics". In Proceedings of the Fourth ACM Conference on Computer and Communications Security, pages 48--56, April 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. R. Quinlan. C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo, CA, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Quinlan. Data mining tools See5 and C5.0. www.rulequest.com/see5-info.html, 2003.]]Google ScholarGoogle Scholar
  31. M. Rajagopalan, S. Debray, M. Hiltunen, and R. Schlichting. "Profile-directed optimization of event-based programs". In Proceedings of the ACM SIGPLAN on Programming Language Design and Implementation, June 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. I. Recognition. "Hand geometry technology". www.recogsys.com, 2004.]]Google ScholarGoogle Scholar
  33. R. E. Schapire. A brief introduction to boosting. In IJCAI, pages 1401--1406, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Schonlau, W. DuMouchel, W. Ju, A. F. Karr, M. Theus, and Y. Vardi. "Computer intrusion: Detecting masquerades". 16(1):58-74. February 2001.]]Google ScholarGoogle Scholar
  35. I. Security. "Index security: Biometric fingerprint ID". www.index-security.com, 2004.]]Google ScholarGoogle Scholar
  36. K. Sequeira and M. Zaki. "ADMIT: Anomaly-based data mining for intrusions". In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 386--395. ACM Press, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. J. Shavlik, M. Shavlik, and M. Fahland. "Evaluating software sensors for actively profiling Windows 2000 users". In Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection, October 2001.]]Google ScholarGoogle Scholar
  38. L. Thalheim, J. Krissler, and P. M. Ziegler. "Body check: Biometrics defeated". www.heise.de/ct/english/02/11/114/, June 2002.]]Google ScholarGoogle Scholar
  39. D. Wagner and D. Dean. "Intrusion detection via static analysis". In Proceedings of IEEE Symposium on Security and Privacy, pages 156--169, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. D. Wagner and P. Soto. "Mimicry attacks on host based intrusion detection systems". In Proceedings Ninth ACM Conference on Computer and Communications Security, pages 255--264. ACM Press, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. C. Warrender, S. Forrest, and B. A. Pearlmutter. "Detecting intrusions using system calls: Alternative data models". In Proceedings of the IEEE Symposium on Security and Privacy, pages 133--145, 1999.]]Google ScholarGoogle ScholarCross RefCross Ref
  42. A. Wespi, M. Dacier, and H. Debar. "Intrusion detection using variable-length audit trail patterns". In Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection, volume 1907, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. R. Wright. "2003 CSI/FBI computer security survey". http://www.security.fsu.edu/docs/FBI2003.pdf, 2003.]]Google ScholarGoogle Scholar
  44. N. Ye. "A Markov chain model of temporal behavior for anomaly detection". In Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, 2000, pages 171--174, 2000.]]Google ScholarGoogle Scholar

Index Terms

  1. User re-authentication via mouse movements

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
        October 2004
        156 pages
        ISBN:1581139748
        DOI:10.1145/1029208

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader