skip to main content
10.1145/1966913.1966983acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

On mouse dynamics as a behavioral biometric for authentication

Published: 22 March 2011 Publication History

Abstract

The idea of using one's behavior with a pointing device, such as a mouse or a touchpad, as a behavioral biometric for authentication purposes has gained increasing attention over the past decade. A number of interesting approaches based on the idea have emerged in the literature and promising experimental results have been reported; however, we argue that limitations in the past experimental evaluations of these approaches raise questions about their true effectiveness in a practical setting. In this paper, we review existing authentication approaches based on mouse dynamics and shed light on some important limitations regarding how the effectiveness of these approaches has been evaluated in the past. We present the results of several experiments that we conducted to illustrate our observations and suggest guidelines for evaluating future authentication approaches based on mouse dynamics. We also discuss a number of avenues for additional research that we believe are necessary to advance the state of the art in this area.

References

[1]
A. A. E. Ahmed and I. Traore. Anomaly intrusion detection based on biometrics. In IEEE Workshop on Information Assurance and Security, pages 452--453, 2005.
[2]
A. A. E. Ahmed and I. Traore. A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing, 4(3):165--179, 2007.
[3]
P. Bours and C. J. Fullu. A login system using mouse dynamics. In Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 1072--1077, 2009.
[4]
H. Gamboa and A. Fred. An identity authentication system based on human computer interaction behaviour. In 3rd International Workshop on Pattern Recognition on Information Systems, pages 46--55, 2003.
[5]
H. Gamboa and A. Fred. A behavioural biometric system based on human computer interaction. In SPIE 5404 - Biometric Technology for Human Identification, pages 381--392, Orlando, FL USA, 2004.
[6]
H. Gamboa, A. L. N. Fred, and A. K. Jain. Webbiometrics: User verification via web interaction. In Proceedings of Biometrics Symposium, pages 1--6, 2007.
[7]
I. Guyon and A. Elisseeff. An introduction to variable and feature selection. The Journal of Machine Learning Research, 3:1157--1182, 2003.
[8]
S. Hashia, C. Pollett, and M. Stamp. On using mouse movements as a biometric. In Proceeding in the International Conference on Computer Science and its Applications, volume 1, 2005.
[9]
F. Monrose and A. D. Rubin. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 1:351--359, 2000.
[10]
M. Pusara and C. E. Brodley. User re-authentication via mouse movements. In C. E. Brodley, P. Chan, R. Lippman, and W. Yurcik, editors, Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 29 October 2004, Washington DC, USA, pages 1--8. ACM, 2004.
[11]
R. J. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.
[12]
K. Revett, H. Jahankhani, S. T. de Magalhes, and H. M. D. Santos. A survey of user authentication based on mouse dynamics. In Proceedings of 4th International Conference on Global E-Security, volume 12 of Communications in Computer and Information Science, pages 210--219, London, UK, June 2008. Springer Berlin Heidelberg.
[13]
A. Ross and A. Jain. Multimodal biometrics: An overview. In 12th European Signal Processing Conference, pages 1221--1224, Vienna, Austria, 2004.
[14]
D. A. Schulz. Mouse curve biometrics. In Biometric Consortium Conference, 2006 Biometrics Symposium, pages 1--6, 2006.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
March 2011
527 pages
ISBN:9781450305648
DOI:10.1145/1966913
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. behavioral biometrics
  3. human computer interaction
  4. mouse dynamics
  5. mouse movement
  6. pointing devices

Qualifiers

  • Short-paper

Conference

ASIA CCS '11
Sponsor:

Acceptance Rates

ASIACCS '11 Paper Acceptance Rate 35 of 217 submissions, 16%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)59
  • Downloads (Last 6 weeks)4
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media