Skip to main content

Using Mouse Dynamics for Continuous User Authentication

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2018 (FTC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 880))

Included in the following conference series:

Abstract

This paper suggests a new model for user authentication based on mouse dynamics. The proposed model utilizes a neural network to identify user behavior and Gaussian Naïve Bayes classifier is applied for classification purpose and assessing the ability of the proposed model to distinguish between genuine and imposter user. The performance of the proposed model is examined on a dataset of 48 users. The results prove that the proposed model outperforms other models in all evaluation metrics including, accuracy, false accept rate, false reject rate and error equal rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zheng, N., Paloski, A., Wang, H.: An efficient user verification system via mouse movements. In: Proceedings of The 18th ACM Conference on Computer and Communications Security - CCS 2011, Chicago, 17–21 October 2011

    Google Scholar 

  2. Ahmed, A.A.E., Traore, I.: Mouse dynamics biometric technology. In: Klinger, K., Snavely, J. (Eds.) Behavioral Biometrics for Human Identification: Intelligent Applications, pp. 207–223 (2010)

    Google Scholar 

  3. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. 201, 19–36, (2012)

    Article  Google Scholar 

  4. Chao, S., Zhongmin, C., Xiaohong, G., Roy, M.: Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45, 156–171 (2014)

    Google Scholar 

  5. Mondal, S., Bours, P.: A computational approach to the continuous authentication biometric system. Inf. Sci. 304, 28–53 (2015)

    Article  Google Scholar 

  6. Mondal, S., Bours, P.: Combining keystroke and mouse dynamics for continuous user authentication and identification. In: 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), Sendai, Japan, 26 May 2016

    Google Scholar 

  7. Lu, H., Rose, J., Liu, Y., Awad, A., Hou, L.: Combining mouse and eye movement biometrics for user authentication. In: Information Security Practices. Springer, Cham, pp. 55–71 (2017)

    Chapter  Google Scholar 

  8. Shen, C., Cai, Z., Guan, X., Du And, Y., Maxion, R.A.: User authentication through mouse dynamics. IEEE Trans. Inf. Forensics Secur. 8(1), 16–30 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama A. Salman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salman, O.A., Hameed, S.M. (2019). Using Mouse Dynamics for Continuous User Authentication. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 880. Springer, Cham. https://doi.org/10.1007/978-3-030-02686-8_58

Download citation

Publish with us

Policies and ethics