Abstract
Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy and security of our data and systems. Therefore, there is a pressing need to protect our data and systems by improving authentication mechanisms, which are expected to be low cost, unobtrusive, and ideally ubiquitous in nature. Behavioral biometric modalities such as mouse dynamics (mouse behaviors on a graphical user interface (GUI)) and widget interactions (another modality closely related to mouse dynamics that also considers the target (widget) of a GUI interaction, such as links, buttons, and combo-boxes) can bolster the security of existing authentication systems because of their ability to distinguish individuals based on their unique features. As a result, it can be difficult for an imposter to impersonate these behavioral biometrics, making them suitable for authentication. In this article, we survey the literature on mouse dynamics and widget interactions dated from 1897 to 2023. We begin our survey with an account of the psychological perspectives on behavioral biometrics. We then analyze the literature along the following dimensions: tasks and experimental settings for data collection, taxonomy of raw attributes, feature extractions and mathematical definitions, publicly available datasets, algorithms (statistical, machine learning, and deep learning), data fusion, performance, and limitations. We end the paper with presenting challenges and promising research opportunities.
- [1] . 2023. Continuous user authentication using a combination of operation and application-related features. Journal of Innovations in Computer Science and Engineering (JICSE) (2023), 11–27.Google Scholar
- [2] . 2013. User authentication from web browsing behavior. In The 26th International FLAIRS Conference.Google Scholar
- [3] . 2020. BeCAPTCHA-Mouse: Synthetic mouse trajectories and improved bot detection. arXiv preprint arXiv:2005.00890 (2020).Google Scholar
- [4] . 2010. A survey of emerging biometric technologies. International Journal of Computer Applications 9, 10 (2010), 1–5.Google ScholarCross Ref
- [5] . 2007. A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing 4, 3 (2007), 165–179.Google ScholarDigital Library
- [6] . 2010. Mouse dynamics biometric technology. In Behavioral Biometrics for Human Identification: Intelligent Applications. IGI Global, 207–223.Google ScholarCross Ref
- [7] . 2009. Active authentication by mouse movements. In 2009 24th International Symposium on Computer and Information Sciences. IEEE, 571–574.Google ScholarCross Ref
- [8] . 2019. Continuous authentication using mouse clickstream data analysis. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, 76–85.Google ScholarCross Ref
- [9] . 2013. Keystroke dynamics authentication: A survey of free-text methods. International Journal of Computer Science Issues (IJCSI) 10, 4 (2013), 1.Google Scholar
- [10] . 2019. User verification based on mouse dynamics: A comparison of public data sets. In 2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI ’19). IEEE, 143–148.Google Scholar
- [11] . 2019. Intrusion detection using mouse dynamics. IET Biometrics 8, 5 (2019), 285–294.Google ScholarCross Ref
- [12] . 2020. Mouse dynamics based user recognition using deep learning. Acta Universitatis Sapientiae, Informatica 12, 1 (2020), 39–50.Google ScholarCross Ref
- [13] . 2021. SapiMouse: Mouse dynamics-based user authentication using deep feature learning. In 2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI ’21). IEEE, 61–66.Google Scholar
- [14] . 2006. Knowing the user’s every move: User activity tracking for website usability evaluation and implicit interaction. In Proceedings of the 15th International Conference on World Wide Web. 203–212.Google ScholarDigital Library
- [15] . 2014. User identification and authentication using multi-modal behavioral biometrics. Computers & Security 43 (2014), 77–89.Google ScholarCross Ref
- [16] . 2016. balabit/mouse Dynamics Challenge. (2016). https://github.com/balabit/Mouse-Dynamics-ChallengeGoogle Scholar
- [17] . 2014. A survey of authentication based on mouse behaviour. International Journal of Advanced Information Science and Technology 22, 22 (2014).Google Scholar
- [18] . 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 (2012), 116–139.Google ScholarCross Ref
- [19] . 2019. Insights from BB-MAS–A large dataset for typing, gait and swipes of the same person on desktop, tablet and phone. arXiv preprint arXiv:1912.02736 (2019).Google Scholar
- [20] . 2009. A login system using mouse dynamics. In 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 1072–1077.Google ScholarDigital Library
- [21] . 1897. Studies in the physiology and psychology of the telegraphic language. Psychological Review 4, 1 (1897), 27.Google ScholarCross Ref
- [22] . 1978. Evaluation of mouse, rate-controlled isometric joystick, step keys, and text keys for text selection on a CRT. Ergonomics 21, 8 (1978), 601–613.Google ScholarCross Ref
- [23] . 2015. Using mouse dynamics to assess stress during online exams. In International Conference on Hybrid Artificial Intelligence Systems. Springer, 345–356.Google ScholarCross Ref
- [24] . 1997. Human-computer interaction: Psychology as a science of design. Annual Review of Psychology 48, 1 (1997), 61–83.Google ScholarCross Ref
- [25] . 1998. Constructing Written Test Questions for the Basic and Clinical Sciences. National Board of Medical Examiners, Philadelphia, PA.Google Scholar
- [26] . 2019. User authentication based on mouse dynamics using deep neural networks: A comprehensive study. IEEE Transactions on Information Forensics and Security 15 (2019), 1086–1101.Google ScholarDigital Library
- [27] . 2018. Mouse authentication without the temporal aspect–what does a 2D-CNN learn?. In 2018 IEEE Security and Privacy Workshops (SPW ’18). IEEE, 15–21.Google Scholar
- [28] . 2017. A web-based mouse dynamics visualization tool for user attribution in digital forensic readiness. In International Conference on Digital Forensics and Cyber Crime. Springer, 64–79.Google Scholar
- [29] 2007. ISOT Mouse Dynamics Dataset, University of Victoria. (2007). https://www.uvic.ca/engineering/ece/isot/datasets/behavioral-biometric/index.phpGoogle Scholar
- [30] . (n.d.). https://standards.iteh.ai/catalog/standards/clc/3f3cd487-5dcd-45be-a3ff-ae9ab5d69eac/en-50133-1-1996Google Scholar
- [31] . 2003. Java-based Internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 9 (2003), 1166–1172.Google ScholarDigital Library
- [32] . 2017. U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts. (
Mar 2017). https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millionsGoogle Scholar - [33] . 2020. Chinese Military Personnel Charged with Computer Fraud, Economic Espionage and Wire Fraud for Hacking into Credit Reporting Agency Equifax. (
Feb 2020). https://www.justice.gov/opa/pr/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud-hackingGoogle Scholar - [34] . 2012. User identity verification via mouse dynamics. Information Sciences 201 (2012), 19–36.Google ScholarDigital Library
- [35] . 1954. The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology 47, 6 (1954), 381.Google ScholarCross Ref
- [36] . 2022. Artificial intelligence meets kinesthetic intelligence: Mouse-based user authentication based on hybrid human-machine learning. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 1034–1048.Google ScholarDigital Library
- [37] . 2003. An identity authentication system based on human-computer interaction behaviour. In PRIS. 46–55.Google Scholar
- [38] . 2020. Continuous authentication of mouse dynamics based on decision level fusion. In 2020 International Wireless Communications and Mobile Computing (IWCMC ’20). IEEE, 210–214.Google Scholar
- [39] . 1999. Automatically labeling web pages based on normal user actions. In Proceedings of the IJCAI Workshop on Machine Learning for Information Filtering.Google Scholar
- [40] . 2000. Milliseconds matter: An introduction to microstrategies and to their use in describing and predicting interactive behavior. Journal of Experimental Psychology: Applied 6, 4 (2000), 322.Google ScholarCross Ref
- [41] . 1993. Project Ernestine: Validating a GOMS analysis for predicting and explaining real-world task performance. Human-computer Interaction 8, 3 (1993), 237–309.Google ScholarDigital Library
- [42] . 2005. Independent Testing of Iris Recognition Technology. (
May 2005). https://www.hsdl.org/?view&did=464567Google Scholar - [43] . 2020. Dimension Reduction using Isomap. (
Aug 2020). https://medium.com/data-science-in-your-pocket/dimension-reduction-using-isomap-72ead0411decGoogle Scholar - [44] . 2011. Homogeneous physio-behavioral visual and mouse-based biometric. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 3 (2011), 1–30.Google ScholarDigital Library
- [45] . 2017. Twos: A dataset of malicious insider threat behavior based on a gamified competition. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats. 45–56.Google ScholarDigital Library
- [46] . 2005. On using mouse movements as a biometric. In Proceeding in the International Conference on Computer Science and its Applications, Vol. 1. The International Conference on Computer Science and its Applications (ICCSA ’05), 5.Google Scholar
- [47] . 2022. An intelligent approach for fair assessment of online laboratory examinations in laboratory learning systems based on student’s mouse interaction behavior. Applied Sciences 12, 22 (2022), 11416.Google ScholarCross Ref
- [48] . 1952. On the rate of gain of information. Quarterly Journal of Experimental Psychology 4, 1 (1952), 11–26.Google ScholarCross Ref
- [49] . 2012. Hooks Overview — Win32 Apps. (2012). https://docs.microsoft.com/en-us/windows/win32/winmsg/about-hooksGoogle Scholar
- [50] . 2015. Dynamic user authentication based on mouse movements curves. In International Conference on Multimedia Modeling. Springer, 111–122.Google ScholarCross Ref
- [51] . 1991. Capture of moving targets: A modification of Fitts’ Law. Ergonomics 34, 2 (1991), 211–220.Google ScholarCross Ref
- [52] . 2017. Deceive mouse-dynamics-based authentication model via movement simulation. In 2017 10th International Symposium on Computational Intelligence and Design (ISCID ’17), Vol. 1. IEEE, 482–485.Google Scholar
- [53] . 2019. An insider threat detection approach based on mouse dynamics and deep learning. Security and Communication Networks 2019 (2019).Google ScholarDigital Library
- [54] . 2020. Modeling the endpoint uncertainty in crossing-based moving target selection. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–12.Google ScholarDigital Library
- [55] . 2018. Understanding the uncertainty in 1D unidirectional moving target selection. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–12.Google ScholarDigital Library
- [56] . 2019. Modeling the uncertainty in 2D moving target selection. In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology. 1031–1043.Google ScholarDigital Library
- [57] . 2008. Applications of GUI Usage Analysis. Auburn University.Google Scholar
- [58] . A Step-by-Step Explanation of Principal Component Analysis (PCA). (n.d.). https://builtin.com/data-science/step-step-explanation-principal-component-analysisGoogle Scholar
- [59] . 1980. A test of Fitts’ law with moving targets. Human Factors 22, 2 (1980), 225–233.Google ScholarCross Ref
- [60] . 2006. Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 125–143.Google ScholarDigital Library
- [61] . 1996. The GOMS family of user interface analysis techniques: Comparison and contrast. ACM Transactions on Computer-Human Interaction (TOCHI) 3, 4 (1996), 320–351.Google ScholarDigital Library
- [62] . 2011. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 476–482.Google ScholarDigital Library
- [63] . 2017. A user authentication and identification model based on mouse dynamics. In Proceedings of the 6th International Conference on Information Engineering. 1–6.Google ScholarDigital Library
- [64] . 2008. Identifying game players with mouse biometrics. University of Washington. Technical Report (2008).Google Scholar
- [65] . 2023. User interface-based repeated sequence detection method for authentication. Intelligent Automation and Soft Computing 35, 3 (2023), 2573–2588.Google ScholarCross Ref
- [66] . Mouse dynamics as continuous user authentication tool. International Journal of Recent Technology and Engineering (IJRTE), ISSN (n.d.), 10923–10927.Google Scholar
- [67] . 2021. Authenticating Facebook users based on widget interaction behavior. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC ’21). IEEE, 1–8.Google ScholarDigital Library
- [68] . 2006. RUI: Recording user input from interfaces under Windows and Mac OS X. Behavior Research Methods 38, 4 (2006), 656–659.Google ScholarCross Ref
- [69] . 2010. A characterization of online browsing behavior. In Proceedings of the 19th International Conference on World Wide Web. 561–570.Google ScholarDigital Library
- [70] . 1997. An application of machine learning to anomaly detection. In Proceedings of the 20th National Information Systems Security Conference, Vol. 377. Baltimore, USA, 366–380.Google Scholar
- [71] . 1998. Approaches to online learning and concept drift for user identification in computer security. In KDD. 259–263.Google Scholar
- [72] . 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security (TISSEC) 2, 3 (1999), 295–331.Google ScholarDigital Library
- [73] . 1997. Sequence matching and learning in anomaly detection for computer security. In AAAI Workshop: AI Approaches to Fraud Detection and Risk Management. Providence, Rhode Island, 43–49.Google Scholar
- [74] . 2018. Moving target selection: A cue integration model. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–12.Google ScholarDigital Library
- [75] . 2016. Modelling error rates in temporal pointing. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 1857–1868.Google ScholarDigital Library
- [76] . 2023. Numerical Differentiation. (2023). http://www2.math.umd.edu/dlevy/classes/amsc466/lecture-notes/differentiation-chap.pdfGoogle Scholar
- [77] . 2016. Multimodal human attention detection for reading from facial expression, eye gaze, and mouse dynamics. ACM SIGAPP Applied Computing Review 16, 3 (2016), 37–49.Google ScholarDigital Library
- [78] . 2023. Adversarial attacks against mouse- and keyboard-based biometric authentication: Black-box versus domain-specific techniques. International Journal of Information Security (2023), 1–21.Google Scholar
- [79] . 2016. A kind of mouse behavior authentication method on dynamic soft keyboard. In 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC ’16). IEEE, 000211–000216.Google Scholar
- [80] . 1992. Fitts’ law as a research and design tool in human-computer interaction. Human-Computer Interaction 7, 1 (1992), 91–139.Google ScholarDigital Library
- [81] . 2021. Curvature and Radius of Curvature. (
Mar 2021). https://www.math24.net/curvature-radiusGoogle Scholar - [82] . 2019. How to Calculate the Second and Third Numerical Derivative of One Variable f(x). (2019). https://www.mathworks.com/matlabcentral/answers/496527-how-calculate-the-second-and-third-numerical-derivative-of-one-variable-f-xGoogle Scholar
- [83] . 2002. Masquerade detection using truncated command lines. In Proceedings International Conference on Dependable Systems and Networks. IEEE, 219–228.Google ScholarCross Ref
- [84] . 1998. Kernel PCA and de-noising in feature spaces. In NIPS, Vol. 11. 536–542.Google Scholar
- [85] . 2021. Lecture Notes. (2021). http://web.mit.edu/16.unified/www/FALL/systems/Lab_Notes/traj.pdfGoogle Scholar
- [86] . 2013. Continuous authentication using mouse dynamics. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG ’13). IEEE, 1–12.Google Scholar
- [87] . 2017. A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230 (2017), 1–22.Google ScholarDigital Library
- [88] . 2010. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans 40, 6 (2010), 1345–1353.Google ScholarDigital Library
- [89] . 1994. A multilayer neural network system for computer access security. IEEE Transactions on Systems, Man, and Cybernetics 24, 5 (1994), 806–813.Google ScholarCross Ref
- [90] . 1993. An online neural network system for computer access security. IEEE Transactions on Industrial Electronics 40, 2 (1993), 235–242.Google ScholarCross Ref
- [91] . 1995. The growth of cognitive modeling in human-computer interaction since GOMS. In Readings in Human–Computer Interaction. Elsevier, 603–625.Google ScholarCross Ref
- [92] . 2009. Classification of instant messaging communications for forensics analysis. The International Journal of Forensic Computer Science 1 (2009), 22–28.Google ScholarCross Ref
- [93] . 2017. Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 506–519.Google ScholarDigital Library
- [94] . 2020. An intermittent click planning model. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarDigital Library
- [95] . 2004. Mining sequential patterns by pattern-growth: The PrefixSpan approach. IEEE Transactions on Knowledge and Data Engineering 16, 11 (2004), 1424–1440.Google ScholarDigital Library
- [96] . 2000. An introduction evaluating biometric systems. Computer 33, 2 (2000), 56–63.Google ScholarDigital Library
- [97] . 2015. Detection of distraction and fatigue in groups through the analysis of interaction patterns with computers. In Intelligent Distributed Computing VIII. Springer, 29–39.Google Scholar
- [98] . 2007. An examination of user behavior for user re-authentication. Ph.D. Dissertation. Purdue University.Google Scholar
- [99] . 2004. User re-authentication via mouse movements. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. 1–8.Google ScholarDigital Library
- [100] . 2001. An analysis of minutiae matching strength. In International Conference on Audio- and Video-Based Biometric Person Authentication. Springer, 223–228.Google ScholarCross Ref
- [101] . 2008. A survey of user authentication based on mouse dynamics. In International Conference on Global e-Security. Springer, 210–219.Google ScholarCross Ref
- [102] . 2003. Information fusion in biometrics. Pattern Recognition Letters 24, 13 (2003), 2115–2125.Google ScholarDigital Library
- [103] . 2006. Handbook of Multibiometrics. Vol. 6. Springer Science & Business Media.Google ScholarDigital Library
- [104] . 2018. Using mouse dynamics for continuous user authentication. In Proceedings of the Future Technologies Conference. Springer, 776–787.Google Scholar
- [105] . 1986. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological Bulletin 99, 3 (1986), 303.Google ScholarCross Ref
- [106] . Four Wheel Safe Locks. (n.d.). https://classlocks.com.au/downloads/SafeInstructions/S&G4Wheel.pdfGoogle Scholar
- [107] . 2009. A static authentication framework based on mouse gesture dynamics. University of Victoria, Canada.Google Scholar
- [108] . 2013. Biometric authentication using mouse gesture dynamics. IEEE Systems Journal 7, 2 (2013), 262–274.Google ScholarCross Ref
- [109] . 2001. Estimating the support of a high-dimensional distribution. Neural Computation 13, 7 (2001), 1443–1471.Google ScholarDigital Library
- [110] . 2001. Computer intrusion: Detecting masquerades. Statistical Science (2001), 58–74.Google Scholar
- [111] . 2006. Mouse curve biometrics. In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 1–6.Google ScholarCross Ref
- [112] . 1949. The mathematical theory of information. Urbana: University of Illinois Press 97 (1949).Google Scholar
- [113] . 2012. Continuous authentication for mouse dynamics: A pattern-growth approach. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN ’12). IEEE, 1–12.Google ScholarCross Ref
- [114] . 2010. A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring. In 2010 IEEE International Conference on Information Theory and Information Security. IEEE, 349–353.Google ScholarCross Ref
- [115] . 2012. User authentication through mouse dynamics. IEEE Transactions on Information Forensics and Security 8, 1 (2012), 16–30.Google ScholarDigital Library
- [116] . 2014. Performance evaluation of anomaly-detection algorithms for mouse dynamics. Computers & Security 45 (2014), 156–171.Google ScholarDigital Library
- [117] . 2009. Feature analysis of mouse dynamics in identity authentication and monitoring. In 2009 IEEE International Conference on Communications. IEEE, 1–5.Google ScholarCross Ref
- [118] . 2012. On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. In 2012 5th IAPR International Conference on Biometrics (ICB ’12). IEEE, 378–383.Google ScholarCross Ref
- [119] . 2017. Pattern-growth based mining mouse-interaction behavior for an active user authentication system. IEEE Transactions on Dependable and Secure Computing 17, 2 (2017), 335–349.Google ScholarDigital Library
- [120] . 2023. User authentication method based on keystroke dynamics and mouse dynamics using HDA. Multimedia Systems 29, 2 (2023), 653–668.Google ScholarDigital Library
- [121] . 1980. Software Psychology: Human Factors in Computer and Information Systems (Winthrop Computer Systems Series). Winthrop Publishers.Google ScholarDigital Library
- [122] . 2021. Continuous authentication using mouse movements, machine learning, and minecraft. arXiv preprint arXiv:2110.11080 (2021).Google Scholar
- [123] . 2022. Machine and deep learning applications to mouse dynamics for continuous user authentication. Machine Learning and Knowledge Extraction 4, 2 (2022), 502–518.Google ScholarCross Ref
- [124] . 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17 (1975), 3346.Google Scholar
- [125] . 1998. A user identification system using signature written with mouse. In Australasian Conference on Information Security and Privacy. Springer, 403–414.Google ScholarCross Ref
- [126] . 2017. Insights from curve fitting models in mouse dynamics authentication systems. In 2017 IEEE Conference on Application, Information and Network Security (AINS ’17). IEEE, 42–47.Google ScholarCross Ref
- [127] . 2019. Adversarial attacks on remote user authentication using behavioural mouse dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN ’19). IEEE, 1–10.Google Scholar
- [128] . 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013).Google ScholarCross Ref
- [129] . 2010. Introduction to Pattern Recognition: A MATLAB Approach. Academic Press.Google ScholarDigital Library
- [130] . 2023. Insider intrusion detection techniques: A state-of-the-art review. Journal of Computer Information Systems (2023), 1–18.Google Scholar
- [131] . 2004. Attacks on biometric systems: A case study in fingerprints. In Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306. International Society for Optics and Photonics, 622–633.Google Scholar
- [132] . 2021. Applications of the Derivative. (2021). https://understandingcalculus.com/chapters/06/6-2.phpGoogle Scholar
- [133] . 2007. Biometric Technologies and Verification Systems. Elsevier.Google ScholarDigital Library
- [134] . MouseWheel-Deltay. (n.d.). https://www.w3schools.com/jsref/event_wheel_deltay.aspGoogle Scholar
- [135] . 2023. A user study of keystroke dynamics as second factor in web MFA. In Proceedings of the 13th ACM Conference on Data and Application Security and Privacy (CODASPY ’23). Association for Computing Machinery, New York, NY, USA, 61–72.
DOI: Google ScholarDigital Library - [136] . 1899. Studies on the telegraphic language: The acquisition of a hierarchy of habits. Psychological Review 6, 4 (1899), 345.Google ScholarCross Ref
- [137] . 1989. A learning algorithm for continually running fully recurrent neural networks. Neural Computation 1, 2 (1989), 270–280.Google ScholarDigital Library
- [138] . 2008. An error model for pointing based on Fitts’ law. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1613–1622.Google ScholarDigital Library
- [139] . 2010. A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy. IEEE, 223–238.Google ScholarDigital Library
- [140] . 2008. Queuing network modeling of transcription typing. ACM Transactions on Computer-Human Interaction (TOCHI) 15, 1 (2008), 1–45.Google ScholarDigital Library
- [141] . 2008. Behavioural biometrics: A survey and classification. International Journal of Biometrics 1, 1 (2008), 81–113.Google ScholarDigital Library
- [142] . 2004. Speed–accuracy tradeoff in Fitts’ law tasks–on the equivalency of actual and nominal pointing precision. International Journal of Human-Computer Studies 61, 6 (2004), 823–856.Google ScholarDigital Library
- [143] Nan Zheng. 2014. Exploiting behavioral biometrics for user security enhancements. Dissertations, Theses, and Masters Projects. William & Mary. Google ScholarCross Ref
- [144] . 2011. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM Conference on Computer and Communications Security. 139–150.Google ScholarDigital Library
- [145] . 2016. An efficient user verification system using angle-based mouse movement biometrics. ACM Transactions on Information and System Security (TISSEC) 18, 3 (2016), 1–27.Google ScholarDigital Library
- [146] . 2009. Speed-accuracy tradeoff in trajectory-based tasks with temporal constraint. In Human-Computer Interaction–INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24–28, 2009, Proceedings, Part I 12. Springer, 906–919.Google ScholarDigital Library
Index Terms
- Mouse Dynamics Behavioral Biometrics: A Survey
Recommendations
On mouse dynamics as a behavioral biometric for authentication
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications SecurityThe idea of using one's behavior with a pointing device, such as a mouse or a touchpad, as a behavioral biometric for authentication purposes has gained increasing attention over the past decade. A number of interesting approaches based on the idea have ...
User authentication method based on keystroke dynamics and mouse dynamics using HDA
AbstractBiometric authentication has advantages over traditional authentication based on passwords or pin number (PIN) in that it is based on the user's inherent characteristics which is not easily stolen or lost. Keystroke dynamics and mouse dynamics are ...
A Multimodal Biometric User Identification System Based on Keystroke Dynamics and Mouse Movements
Computer Information Systems and Industrial ManagementAbstractIn this work it is shown how the behavioral biometrics allows to strengthen security of a personal computer during casual use. The user does not have to be even aware of verification system running in the background. Unfortunately, short passwords ...
Comments