skip to main content
survey

Mouse Dynamics Behavioral Biometrics: A Survey

Published:23 February 2024Publication History
Skip Abstract Section

Abstract

Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy and security of our data and systems. Therefore, there is a pressing need to protect our data and systems by improving authentication mechanisms, which are expected to be low cost, unobtrusive, and ideally ubiquitous in nature. Behavioral biometric modalities such as mouse dynamics (mouse behaviors on a graphical user interface (GUI)) and widget interactions (another modality closely related to mouse dynamics that also considers the target (widget) of a GUI interaction, such as links, buttons, and combo-boxes) can bolster the security of existing authentication systems because of their ability to distinguish individuals based on their unique features. As a result, it can be difficult for an imposter to impersonate these behavioral biometrics, making them suitable for authentication. In this article, we survey the literature on mouse dynamics and widget interactions dated from 1897 to 2023. We begin our survey with an account of the psychological perspectives on behavioral biometrics. We then analyze the literature along the following dimensions: tasks and experimental settings for data collection, taxonomy of raw attributes, feature extractions and mathematical definitions, publicly available datasets, algorithms (statistical, machine learning, and deep learning), data fusion, performance, and limitations. We end the paper with presenting challenges and promising research opportunities.

REFERENCES

  1. [1] Abin Ahmad Ali, Hosseini Parisima, and Raj Alireza Torabian. 2023. Continuous user authentication using a combination of operation and application-related features. Journal of Innovations in Computer Science and Engineering (JICSE) (2023), 1127.Google ScholarGoogle Scholar
  2. [2] Abramson Myriam and Aha David. 2013. User authentication from web browsing behavior. In The 26th International FLAIRS Conference.Google ScholarGoogle Scholar
  3. [3] Acien Alejandro, Morales Aythami, Fierrez Julian, and Vera-Rodriguez Ruben. 2020. BeCAPTCHA-Mouse: Synthetic mouse trajectories and improved bot detection. arXiv preprint arXiv:2005.00890 (2020).Google ScholarGoogle Scholar
  4. [4] Adeoye Olufemi Sunday. 2010. A survey of emerging biometric technologies. International Journal of Computer Applications 9, 10 (2010), 15.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Ahmed Ahmed Awad E. and Traore Issa. 2007. A new biometric technology based on mouse dynamics. IEEE Transactions on Dependable and Secure Computing 4, 3 (2007), 165179.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Ahmed Ahmed Awad E. and Traore Issa. 2010. Mouse dynamics biometric technology. In Behavioral Biometrics for Human Identification: Intelligent Applications. IGI Global, 207223.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Aksari Yigitcan and Artuner Harun. 2009. Active authentication by mouse movements. In 2009 24th International Symposium on Computer and Information Sciences. IEEE, 571574.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Almalki Sultan, Chatterjee Prosenjit, and Roy Kaushik. 2019. Continuous authentication using mouse clickstream data analysis. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, 7685.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Alsultan Arwa and Warwick Kevin. 2013. Keystroke dynamics authentication: A survey of free-text methods. International Journal of Computer Science Issues (IJCSI) 10, 4 (2013), 1.Google ScholarGoogle Scholar
  10. [10] Antal Margit and Denes-Fazakas Lehel. 2019. User verification based on mouse dynamics: A comparison of public data sets. In 2019 IEEE 13th International Symposium on Applied Computational Intelligence and Informatics (SACI ’19). IEEE, 143148.Google ScholarGoogle Scholar
  11. [11] Antal Margit and Egyed-Zsigmond Elöd. 2019. Intrusion detection using mouse dynamics. IET Biometrics 8, 5 (2019), 285294.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Antal Margit and Fejér Norbert. 2020. Mouse dynamics based user recognition using deep learning. Acta Universitatis Sapientiae, Informatica 12, 1 (2020), 3950.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Antal Margit, Fejér Norbert, and Buza Krisztian. 2021. SapiMouse: Mouse dynamics-based user authentication using deep feature learning. In 2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI ’21). IEEE, 6166.Google ScholarGoogle Scholar
  14. [14] Atterer Richard, Wnuk Monika, and Schmidt Albrecht. 2006. Knowing the user’s every move: User activity tracking for website usability evaluation and implicit interaction. In Proceedings of the 15th International Conference on World Wide Web. 203212.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Bailey Kyle O., Okolica James S., and Peterson Gilbert L.. 2014. User identification and authentication using multi-modal behavioral biometrics. Computers & Security 43 (2014), 7789.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Balabit. 2016. balabit/mouse Dynamics Challenge. (2016). https://github.com/balabit/Mouse-Dynamics-ChallengeGoogle ScholarGoogle Scholar
  17. [17] Balaganesh P. M. and Sonia A.. 2014. A survey of authentication based on mouse behaviour. International Journal of Advanced Information Science and Technology 22, 22 (2014).Google ScholarGoogle Scholar
  18. [18] Banerjee Salil P. and Woodard Damon L.. 2012. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 (2012), 116139.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Belman Amith K., Wang Li, Iyengar S. S., Sniatala Pawel, Wright Robert, Dora Robert, Baldwin Jacob, Jin Zhanpeng, and Phoha Vir V.. 2019. Insights from BB-MAS–A large dataset for typing, gait and swipes of the same person on desktop, tablet and phone. arXiv preprint arXiv:1912.02736 (2019).Google ScholarGoogle Scholar
  20. [20] Bours Patrick and Fullu Christopher Johnsrud. 2009. A login system using mouse dynamics. In 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 10721077.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Bryan William Lowe and Harter Noble. 1897. Studies in the physiology and psychology of the telegraphic language. Psychological Review 4, 1 (1897), 27.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Card Stuart K., English William K., and Burr Betty J.. 1978. Evaluation of mouse, rate-controlled isometric joystick, step keys, and text keys for text selection on a CRT. Ergonomics 21, 8 (1978), 601613.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Carneiro Davide, Novais Paulo, Pêgo José Miguel, Sousa Nuno, and Neves José. 2015. Using mouse dynamics to assess stress during online exams. In International Conference on Hybrid Artificial Intelligence Systems. Springer, 345356.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Carroll John M.. 1997. Human-computer interaction: Psychology as a science of design. Annual Review of Psychology 48, 1 (1997), 6183.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Case Susan M. and Swanson David B.. 1998. Constructing Written Test Questions for the Basic and Clinical Sciences. National Board of Medical Examiners, Philadelphia, PA.Google ScholarGoogle Scholar
  26. [26] Chong Penny, Elovici Yuval, and Binder Alexander. 2019. User authentication based on mouse dynamics using deep neural networks: A comprehensive study. IEEE Transactions on Information Forensics and Security 15 (2019), 10861101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Chong Penny, Tan Yi Xiang Marcus, Guarnizo Juan, Elovici Yuval, and Binder Alexander. 2018. Mouse authentication without the temporal aspect–what does a 2D-CNN learn?. In 2018 IEEE Security and Privacy Workshops (SPW ’18). IEEE, 1521.Google ScholarGoogle Scholar
  28. [28] Ernsberger Dominik, Ikuesan R. Adeyemi, Venter S. Hein, and Zugenmaier Alf. 2017. A web-based mouse dynamics visualization tool for user attribution in digital forensic readiness. In International Conference on Digital Forensics and Cyber Crime. Springer, 6479.Google ScholarGoogle Scholar
  29. [29] al. Ahmed et2007. ISOT Mouse Dynamics Dataset, University of Victoria. (2007). https://www.uvic.ca/engineering/ece/isot/datasets/behavioral-biometric/index.phpGoogle ScholarGoogle Scholar
  30. [30] requirements Standard Number EN 50J33-J : J996IAJ: 2002 Technical Body CLClTC 79 European Committee for Electrotechnical Standardization (CENELEC) 2002 European Standard EN 50133-1 Access control systems for use in security applications, Part 1: System. (n.d.). https://standards.iteh.ai/catalog/standards/clc/3f3cd487-5dcd-45be-a3ff-ae9ab5d69eac/en-50133-1-1996Google ScholarGoogle Scholar
  31. [31] Everitt Ross A. J. and McOwan Peter W.. 2003. Java-based Internet biometric authentication system. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 9 (2003), 11661172.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] FBI. 2017. U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts. (Mar 2017). https://www.justice.gov/opa/pr/us-charges-russian-fsb-officers-and-their-criminal-conspirators-hacking-yahoo-and-millionsGoogle ScholarGoogle Scholar
  33. [33] FBI. 2020. Chinese Military Personnel Charged with Computer Fraud, Economic Espionage and Wire Fraud for Hacking into Credit Reporting Agency Equifax. (Feb 2020). https://www.justice.gov/opa/pr/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud-hackingGoogle ScholarGoogle Scholar
  34. [34] Feher Clint, Elovici Yuval, Moskovitch Robert, Rokach Lior, and Schclar Alon. 2012. User identity verification via mouse dynamics. Information Sciences 201 (2012), 1936.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Fitts Paul M.. 1954. The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology 47, 6 (1954), 381.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Fu Shen, Qin Dong, Amariucai George, Qiao Daji, Guan Yong, and Smiley Ann. 2022. Artificial intelligence meets kinesthetic intelligence: Mouse-based user authentication based on hybrid human-machine learning. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 10341048.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Gamboa Hugo and Fred Ana L. N.. 2003. An identity authentication system based on human-computer interaction behaviour. In PRIS. 4655.Google ScholarGoogle Scholar
  38. [38] Gao Lifang, Lian Yangyang, Yang Huifeng, Xin Rui, Yu Zhuozhi, Chen Wenwei, Liu Wei, Zhang Yefeng, Zhu Yukun, Xu Siya, et al. 2020. Continuous authentication of mouse dynamics based on decision level fusion. In 2020 International Wireless Communications and Mobile Computing (IWCMC ’20). IEEE, 210214.Google ScholarGoogle Scholar
  39. [39] Goecks Jeremy and Shavlik Jude. 1999. Automatically labeling web pages based on normal user actions. In Proceedings of the IJCAI Workshop on Machine Learning for Information Filtering.Google ScholarGoogle Scholar
  40. [40] Gray Wayne D. and Boehm-Davis Deborah A.. 2000. Milliseconds matter: An introduction to microstrategies and to their use in describing and predicting interactive behavior. Journal of Experimental Psychology: Applied 6, 4 (2000), 322.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Gray Wayne D., John Bonnie E., and Atwood Michael E.. 1993. Project Ernestine: Validating a GOMS analysis for predicting and explaining real-world task performance. Human-computer Interaction 8, 3 (1993), 237309.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Group International Biometric. 2005. Independent Testing of Iris Recognition Technology. (May 2005). https://www.hsdl.org/?view&did=464567Google ScholarGoogle Scholar
  43. [43] Gupta Mehul. 2020. Dimension Reduction using Isomap. (Aug 2020). https://medium.com/data-science-in-your-pocket/dimension-reduction-using-isomap-72ead0411decGoogle ScholarGoogle Scholar
  44. [44] Hamdy Omar and Traoré Issa. 2011. Homogeneous physio-behavioral visual and mouse-based biometric. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 3 (2011), 130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Harilal Athul, Toffalini Flavio, Castellanos John, Guarnizo Juan, Homoliak Ivan, and Ochoa Martín. 2017. Twos: A dataset of malicious insider threat behavior based on a gamified competition. In Proceedings of the 2017 International Workshop on Managing Insider Security Threats. 4556.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Hashia Shivani, Pollett Chris, and Stamp Mark. 2005. On using mouse movements as a biometric. In Proceeding in the International Conference on Computer Science and its Applications, Vol. 1. The International Conference on Computer Science and its Applications (ICCSA ’05), 5.Google ScholarGoogle Scholar
  47. [47] Hosny Hadeer A. Hassan, Ibrahim Abdulrahman A., Elmesalawy Mahmoud M., and El-Haleem Ahmed M. Abd. 2022. An intelligent approach for fair assessment of online laboratory examinations in laboratory learning systems based on student’s mouse interaction behavior. Applied Sciences 12, 22 (2022), 11416.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Hick William E.. 1952. On the rate of gain of information. Quarterly Journal of Experimental Psychology 4, 1 (1952), 1126.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Hickeys. 2012. Hooks Overview — Win32 Apps. (2012). https://docs.microsoft.com/en-us/windows/win32/winmsg/about-hooksGoogle ScholarGoogle Scholar
  50. [50] Hinbarji Zaher, Albatal Rami, and Gurrin Cathal. 2015. Dynamic user authentication based on mouse movements curves. In International Conference on Multimedia Modeling. Springer, 111122.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Hoffmann Errol R.. 1991. Capture of moving targets: A modification of Fitts’ Law. Ergonomics 34, 2 (1991), 211220.Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Hu Shujie, Bai Jun, Liu Hongri, Wang Chao, and Wang Bailing. 2017. Deceive mouse-dynamics-based authentication model via movement simulation. In 2017 10th International Symposium on Computational Intelligence and Design (ISCID ’17), Vol. 1. IEEE, 482485.Google ScholarGoogle Scholar
  53. [53] Hu Teng, Niu Weina, Zhang Xiaosong, Liu Xiaolei, Lu Jiazhong, and Liu Yuan. 2019. An insider threat detection approach based on mouse dynamics and deep learning. Security and Communication Networks 2019 (2019).Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Huang Jin, Tian Feng, Fan Xiangmin, Tu Huawei, Zhang Hao, Peng Xiaolan, and Wang Hongan. 2020. Modeling the endpoint uncertainty in crossing-based moving target selection. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. [55] Huang Jin, Tian Feng, Fan Xiangmin, Zhang Xiaolong, and Zhai Shumin. 2018. Understanding the uncertainty in 1D unidirectional moving target selection. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Huang Jin, Tian Feng, Li Nianlong, and Fan Xiangmin. 2019. Modeling the uncertainty in 2D moving target selection. In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology. 10311043.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Imsand Eric Shaun. 2008. Applications of GUI Usage Analysis. Auburn University.Google ScholarGoogle Scholar
  58. [58] Jaadi Zakaria. A Step-by-Step Explanation of Principal Component Analysis (PCA). (n.d.). https://builtin.com/data-science/step-step-explanation-principal-component-analysisGoogle ScholarGoogle Scholar
  59. [59] Jagacinski Richard J., Repperger Daniel W., Ward Sharon L., and Moran Martin S.. 1980. A test of Fitts’ law with moving targets. Human Factors 22, 2 (1980), 225233.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Jain Anil K., Ross Arun, and Pankanti Sharath. 2006. Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 125143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61] John Bonnie E. and Kieras David E.. 1996. The GOMS family of user interface analysis techniques: Comparison and contrast. ACM Transactions on Computer-Human Interaction (TOCHI) 3, 4 (1996), 320351.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] Jorgensen Zach and Yu Ting. 2011. On mouse dynamics as a behavioral biometric for authentication. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 476482.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] Kaixin Wang, Hongri Liu, Bailing Wang, Shujie Hu, and Jia Song. 2017. A user authentication and identification model based on mouse dynamics. In Proceedings of the 6th International Conference on Information Engineering. 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Kaminsky Ryan, Enev Miro, and Andersen Erik. 2008. Identifying game players with mouse biometrics. University of Washington. Technical Report (2008).Google ScholarGoogle Scholar
  65. [65] Kang Shin Jin and Kim Soo Kyun. 2023. User interface-based repeated sequence detection method for authentication. Intelligent Automation and Soft Computing 35, 3 (2023), 25732588.Google ScholarGoogle ScholarCross RefCross Ref
  66. [66] Khan Anam, Quraishi Suhail Javed, and Bedi Sarabjeet Singh. Mouse dynamics as continuous user authentication tool. International Journal of Recent Technology and Engineering (IJRTE), ISSN (n.d.), 10923–10927.Google ScholarGoogle Scholar
  67. [67] Khan Simon, Fraser Cooper, Hou Daqing, Banavar Mahesh, and Schuckers Stephanie. 2021. Authenticating Facebook users based on widget interaction behavior. In 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC ’21). IEEE, 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Kukreja Urmila, Stevenson William E., and Ritter Frank E.. 2006. RUI: Recording user input from interfaces under Windows and Mac OS X. Behavior Research Methods 38, 4 (2006), 656659.Google ScholarGoogle ScholarCross RefCross Ref
  69. [69] Kumar Ravi and Tomkins Andrew. 2010. A characterization of online browsing behavior. In Proceedings of the 19th International Conference on World Wide Web. 561570.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Lane Terran and Brodley Carla E.. 1997. An application of machine learning to anomaly detection. In Proceedings of the 20th National Information Systems Security Conference, Vol. 377. Baltimore, USA, 366380.Google ScholarGoogle Scholar
  71. [71] Lane Terran and Brodley Carla E.. 1998. Approaches to online learning and concept drift for user identification in computer security. In KDD. 259263.Google ScholarGoogle Scholar
  72. [72] Lane Terran and Brodley Carla E.. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security (TISSEC) 2, 3 (1999), 295331.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. [73] Lane Terran, Brodley Carla E., et al. 1997. Sequence matching and learning in anomaly detection for computer security. In AAAI Workshop: AI Approaches to Fraud Detection and Risk Management. Providence, Rhode Island, 4349.Google ScholarGoogle Scholar
  74. [74] Lee Byungjoo, Kim Sunjun, Oulasvirta Antti, Lee Jong-In, and Park Eunji. 2018. Moving target selection: A cue integration model. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. [75] Lee Byungjoo and Oulasvirta Antti. 2016. Modelling error rates in temporal pointing. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 18571868.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Levy D.. 2023. Numerical Differentiation. (2023). http://www2.math.umd.edu/dlevy/classes/amsc466/lecture-notes/differentiation-chap.pdfGoogle ScholarGoogle Scholar
  77. [77] Li Jiajia, Ngai Grace, Leong Hong Va, and Chan Stephen C. F.. 2016. Multimodal human attention detection for reading from facial expression, eye gaze, and mouse dynamics. ACM SIGAPP Applied Computing Review 16, 3 (2016), 3749.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. [78] López Christian, Solano Jesús, Rivera Esteban, Tengana Lizzy, Florez-Lozano Johana, Castelblanco Alejandra, and Ochoa Martín. 2023. Adversarial attacks against mouse- and keyboard-based biometric authentication: Black-box versus domain-specific techniques. International Journal of Information Security (2023), 121.Google ScholarGoogle Scholar
  79. [79] Ma Lei, Yan Chungang, Zhao Peihai, and Wang Mimi. 2016. A kind of mouse behavior authentication method on dynamic soft keyboard. In 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC ’16). IEEE, 000211000216.Google ScholarGoogle Scholar
  80. [80] MacKenzie I. Scott. 1992. Fitts’ law as a research and design tool in human-computer interaction. Human-Computer Interaction 7, 1 (1992), 91139.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. [81] Math24. 2021. Curvature and Radius of Curvature. (Mar 2021). https://www.math24.net/curvature-radiusGoogle ScholarGoogle Scholar
  82. [82] Mathworks. 2019. How to Calculate the Second and Third Numerical Derivative of One Variable f(x). (2019). https://www.mathworks.com/matlabcentral/answers/496527-how-calculate-the-second-and-third-numerical-derivative-of-one-variable-f-xGoogle ScholarGoogle Scholar
  83. [83] Maxion Roy A. and Townsend Tahlia N.. 2002. Masquerade detection using truncated command lines. In Proceedings International Conference on Dependable Systems and Networks. IEEE, 219228.Google ScholarGoogle ScholarCross RefCross Ref
  84. [84] Mika Sebastian, Schölkopf Bernhard, Smola Alexander J., Müller Klaus-Robert, Scholz Matthias, and Rätsch Gunnar. 1998. Kernel PCA and de-noising in feature spaces. In NIPS, Vol. 11. 536542.Google ScholarGoogle Scholar
  85. [85] MIT. 2021. Lecture Notes. (2021). http://web.mit.edu/16.unified/www/FALL/systems/Lab_Notes/traj.pdfGoogle ScholarGoogle Scholar
  86. [86] Mondal Soumik and Bours Patrick. 2013. Continuous authentication using mouse dynamics. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG ’13). IEEE, 112.Google ScholarGoogle Scholar
  87. [87] Mondal Soumik and Bours Patrick. 2017. A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230 (2017), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. [88] Nakkabi Youssef, Traoré Issa, and Ahmed Ahmed Awad E.. 2010. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans 40, 6 (2010), 13451353.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. [89] Obaidat M. S. and Macchairolo D. T.. 1994. A multilayer neural network system for computer access security. IEEE Transactions on Systems, Man, and Cybernetics 24, 5 (1994), 806813.Google ScholarGoogle ScholarCross RefCross Ref
  90. [90] Obaidat Mohammad S. and Macchiarolo David T.. 1993. An online neural network system for computer access security. IEEE Transactions on Industrial Electronics 40, 2 (1993), 235242.Google ScholarGoogle ScholarCross RefCross Ref
  91. [91] Olson Judith Reitman and Olson Gary M.. 1995. The growth of cognitive modeling in human-computer interaction since GOMS. In Readings in Human–Computer Interaction. Elsevier, 603625.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Orebaugh Angela and Allnutt Jeremy. 2009. Classification of instant messaging communications for forensics analysis. The International Journal of Forensic Computer Science 1 (2009), 2228.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Papernot Nicolas, McDaniel Patrick, Goodfellow Ian, Jha Somesh, Celik Z. Berkay, and Swami Ananthram. 2017. Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 506519.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. [94] Park Eunji and Lee Byungjoo. 2020. An intermittent click planning model. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. [95] Pei Jian, Han Jiawei, Mortazavi-Asl Behzad, Wang Jianyong, Pinto Helen, Chen Qiming, Dayal Umeshwar, and Hsu Mei-Chun. 2004. Mining sequential patterns by pattern-growth: The PrefixSpan approach. IEEE Transactions on Knowledge and Data Engineering 16, 11 (2004), 14241440.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. [96] Phillips P. Jonathon, Martin Alvin, Wilson Charles L., and Przybocki Mark. 2000. An introduction evaluating biometric systems. Computer 33, 2 (2000), 5663.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. [97] Pimenta André, Carneiro Davide, Novais Paulo, and Neves José. 2015. Detection of distraction and fatigue in groups through the analysis of interaction patterns with computers. In Intelligent Distributed Computing VIII. Springer, 2939.Google ScholarGoogle Scholar
  98. [98] Pusara Maja. 2007. An examination of user behavior for user re-authentication. Ph.D. Dissertation. Purdue University.Google ScholarGoogle Scholar
  99. [99] Pusara Maja and Brodley Carla E.. 2004. User re-authentication via mouse movements. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. [100] Ratha Nalini K., Connell Jonathan H., and Bolle Ruud M.. 2001. An analysis of minutiae matching strength. In International Conference on Audio- and Video-Based Biometric Person Authentication. Springer, 223228.Google ScholarGoogle ScholarCross RefCross Ref
  101. [101] Revett Kenneth, Jahankhani Hamid, Magalhaes Sergio Tenreiro De, and Santos Henrique M. D.. 2008. A survey of user authentication based on mouse dynamics. In International Conference on Global e-Security. Springer, 210219.Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Ross Arun and Jain Anil. 2003. Information fusion in biometrics. Pattern Recognition Letters 24, 13 (2003), 21152125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. [103] Ross Arun A., Nandakumar Karthik, and Jain Anil K.. 2006. Handbook of Multibiometrics. Vol. 6. Springer Science & Business Media.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. [104] Salman Osama A. and Hameed Sarab M.. 2018. Using mouse dynamics for continuous user authentication. In Proceedings of the Future Technologies Conference. Springer, 776787.Google ScholarGoogle Scholar
  105. [105] Salthouse Timothy A.. 1986. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological Bulletin 99, 3 (1986), 303.Google ScholarGoogle ScholarCross RefCross Ref
  106. [106] Sargent and GreenLeaf. Four Wheel Safe Locks. (n.d.). https://classlocks.com.au/downloads/SafeInstructions/S&G4Wheel.pdfGoogle ScholarGoogle Scholar
  107. [107] Sayed Bassam. 2009. A static authentication framework based on mouse gesture dynamics. University of Victoria, Canada.Google ScholarGoogle Scholar
  108. [108] Sayed Bassam, Traoré Issa, Woungang Isaac, and Obaidat Mohammad S.. 2013. Biometric authentication using mouse gesture dynamics. IEEE Systems Journal 7, 2 (2013), 262274.Google ScholarGoogle ScholarCross RefCross Ref
  109. [109] Schölkopf Bernhard, Platt John C., Shawe-Taylor John, Smola Alex J., and Williamson Robert C.. 2001. Estimating the support of a high-dimensional distribution. Neural Computation 13, 7 (2001), 14431471.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. [110] Schonlau Matthias, DuMouchel William, Ju Wen-Hua, Karr Alan F., Theus Martin, and Vardi Yehuda. 2001. Computer intrusion: Detecting masquerades. Statistical Science (2001), 5874.Google ScholarGoogle Scholar
  111. [111] Schulz Douglas A.. 2006. Mouse curve biometrics. In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Shannon Claude E. and Weaver Warren. 1949. The mathematical theory of information. Urbana: University of Illinois Press 97 (1949).Google ScholarGoogle Scholar
  113. [113] Shen Chao, Cai Zhongmin, and Guan Xiaohong. 2012. Continuous authentication for mouse dynamics: A pattern-growth approach. In IEEE/IFIP International Conference on Dependable Systems and Networks (DSN ’12). IEEE, 112.Google ScholarGoogle ScholarCross RefCross Ref
  114. [114] Shen Chao, Cai Zhongmin, Guan Xiaohong, and Cai Jinpei. 2010. A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring. In 2010 IEEE International Conference on Information Theory and Information Security. IEEE, 349353.Google ScholarGoogle ScholarCross RefCross Ref
  115. [115] Shen Chao, Cai Zhongmin, Guan Xiaohong, Du Youtian, and Maxion Roy A.. 2012. User authentication through mouse dynamics. IEEE Transactions on Information Forensics and Security 8, 1 (2012), 1630.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. [116] Shen Chao, Cai Zhongmin, Guan Xiaohong, and Maxion Roy. 2014. Performance evaluation of anomaly-detection algorithms for mouse dynamics. Computers & Security 45 (2014), 156171.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. [117] Shen Chao, Cai Zhongmin, Guan Xiaohong, Sha Huilan, and Du Jingzi. 2009. Feature analysis of mouse dynamics in identity authentication and monitoring. In 2009 IEEE International Conference on Communications. IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  118. [118] Shen Chao, Cai Zhongmin, Guan Xiaohong, and Wang Jialin. 2012. On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. In 2012 5th IAPR International Conference on Biometrics (ICB ’12). IEEE, 378383.Google ScholarGoogle ScholarCross RefCross Ref
  119. [119] Shen Chao, Chen Yufei, Guan Xiaohong, and Maxion Roy A.. 2017. Pattern-growth based mining mouse-interaction behavior for an active user authentication system. IEEE Transactions on Dependable and Secure Computing 17, 2 (2017), 335349.Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. [120] Shi Yutong, Wang Xiujuan, Zheng Kangfeng, and Cao Siwei. 2023. User authentication method based on keystroke dynamics and mouse dynamics using HDA. Multimedia Systems 29, 2 (2023), 653668.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. [121] Shneiderman Ben. 1980. Software Psychology: Human Factors in Computer and Information Systems (Winthrop Computer Systems Series). Winthrop Publishers.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. [122] Siddiqui Nyle, Dave Rushit, and Seliya Naeem. 2021. Continuous authentication using mouse movements, machine learning, and minecraft. arXiv preprint arXiv:2110.11080 (2021).Google ScholarGoogle Scholar
  123. [123] Siddiqui Nyle, Dave Rushit, Vanamala Mounika, and Seliya Naeem. 2022. Machine and deep learning applications to mouse dynamics for continuous user authentication. Machine Learning and Knowledge Extraction 4, 2 (2022), 502518.Google ScholarGoogle ScholarCross RefCross Ref
  124. [124] Spillane R.. 1975. Keyboard apparatus for personal identification. IBM Technical Disclosure Bulletin 17 (1975), 3346.Google ScholarGoogle Scholar
  125. [125] Syukri Agus Fanar, Okamoto Eiji, and Mambo Masahiro. 1998. A user identification system using signature written with mouse. In Australasian Conference on Information Security and Privacy. Springer, 403414.Google ScholarGoogle ScholarCross RefCross Ref
  126. [126] Tan Yi Xiang Marcus, Binder Alexander, and Roy Arunava. 2017. Insights from curve fitting models in mouse dynamics authentication systems. In 2017 IEEE Conference on Application, Information and Network Security (AINS ’17). IEEE, 4247.Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] Tan Yi Xiang Marcus, Iacovazzi Alfonso, Homoliak Ivan, Elovici Yuval, and Binder Alexander. 2019. Adversarial attacks on remote user authentication using behavioural mouse dynamics. In 2019 International Joint Conference on Neural Networks (IJCNN ’19). IEEE, 110.Google ScholarGoogle Scholar
  128. [128] Teh Pin Shen, Teoh Andrew Beng Jin, and Yue Shigang. 2013. A survey of keystroke dynamics biometrics. The Scientific World Journal 2013 (2013).Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Theodoridis Sergios, Pikrakis Aggelos, Koutroumbas Konstantinos, and Cavouras Dionisis. 2010. Introduction to Pattern Recognition: A MATLAB Approach. Academic Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. [130] TN Nisha and Pramod Dhanya. 2023. Insider intrusion detection techniques: A state-of-the-art review. Journal of Computer Information Systems (2023), 118.Google ScholarGoogle Scholar
  131. [131] Uludag Umut and Jain Anil K.. 2004. Attacks on biometric systems: A case study in fingerprints. In Security, Steganography, and Watermarking of Multimedia Contents VI, Vol. 5306. International Society for Optics and Photonics, 622633.Google ScholarGoogle Scholar
  132. [132] Unknown. 2021. Applications of the Derivative. (2021). https://understandingcalculus.com/chapters/06/6-2.phpGoogle ScholarGoogle Scholar
  133. [133] Vacca John R.. 2007. Biometric Technologies and Verification Systems. Elsevier.Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. [134] W3Schools. MouseWheel-Deltay. (n.d.). https://www.w3schools.com/jsref/event_wheel_deltay.aspGoogle ScholarGoogle Scholar
  135. [135] Wahab Ahmed Anu, Hou Daqing, and Schuckers Stephanie. 2023. A user study of keystroke dynamics as second factor in web MFA. In Proceedings of the 13th ACM Conference on Data and Application Security and Privacy (CODASPY ’23). Association for Computing Machinery, New York, NY, USA, 6172. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. [136] William Lowe Bryan and Harter Noble. 1899. Studies on the telegraphic language: The acquisition of a hierarchy of habits. Psychological Review 6, 4 (1899), 345.Google ScholarGoogle ScholarCross RefCross Ref
  137. [137] Williams Ronald J. and Zipser David. 1989. A learning algorithm for continually running fully recurrent neural networks. Neural Computation 1, 2 (1989), 270280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. [138] Wobbrock Jacob O., Cutrell Edward, Harada Susumu, and MacKenzie I. Scott. 2008. An error model for pointing based on Fitts’ law. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 16131622.Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. [139] Wondracek Gilbert, Holz Thorsten, Kirda Engin, and Kruegel Christopher. 2010. A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy. IEEE, 223238.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. [140] Wu Changxu and Liu Yili. 2008. Queuing network modeling of transcription typing. ACM Transactions on Computer-Human Interaction (TOCHI) 15, 1 (2008), 145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. [141] Yampolskiy Roman V. and Govindaraju Venu. 2008. Behavioural biometrics: A survey and classification. International Journal of Biometrics 1, 1 (2008), 81113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. [142] Zhai Shumin, Kong Jing, and Ren Xiangshi. 2004. Speed–accuracy tradeoff in Fitts’ law tasks–on the equivalency of actual and nominal pointing precision. International Journal of Human-Computer Studies 61, 6 (2004), 823856.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. [143] Nan Zheng. 2014. Exploiting behavioral biometrics for user security enhancements. Dissertations, Theses, and Masters Projects. William & Mary. Google ScholarGoogle ScholarCross RefCross Ref
  144. [144] Zheng Nan, Paloski Aaron, and Wang Haining. 2011. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM Conference on Computer and Communications Security. 139150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. [145] Zheng Nan, Paloski Aaron, and Wang Haining. 2016. An efficient user verification system using angle-based mouse movement biometrics. ACM Transactions on Information and System Security (TISSEC) 18, 3 (2016), 127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. [146] Zhou Xiaolei, Cao Xiang, and Ren Xiangshi. 2009. Speed-accuracy tradeoff in trajectory-based tasks with temporal constraint. In Human-Computer Interaction–INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24–28, 2009, Proceedings, Part I 12. Springer, 906919.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mouse Dynamics Behavioral Biometrics: A Survey

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 56, Issue 6
          June 2024
          963 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/3613600
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 February 2024
          • Online AM: 24 January 2024
          • Accepted: 15 December 2023
          • Revised: 28 August 2023
          • Received: 22 February 2022
          Published in csur Volume 56, Issue 6

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • survey
        • Article Metrics

          • Downloads (Last 12 months)430
          • Downloads (Last 6 weeks)92

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text