An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis
<p>Perfect Piano game.</p> "> Figure 2
<p>Movement of the mouse between series of screen locations [<a href="#B22-applsci-11-06083" class="html-bibr">22</a>].</p> "> Figure 3
<p>Data collection parameters and mouse data segmentation into actions.</p> "> Figure 4
<p>User 1 mouse movement, point-and-click actions.</p> "> Figure 5
<p>User 2 mouse movement, point-and-click actions.</p> "> Figure 6
<p>Activity diagram of data preprocessing.</p> "> Figure 7
<p>Angular movement (<span class="html-italic">Θ</span>), travelled distance, angle of curvature and its rate of change.</p> "> Figure 8
<p>The eight directions. Angles between 0° and 45° fall into the direction 1.</p> "> Figure 9
<p>Length of trajectory.</p> "> Figure 10
<p>CNN architecture.</p> "> Figure 11
<p>Continuous authentication and anomaly detection models.</p> "> Figure 12
<p>ROC curves for continuous authentication—single mouse movement action.</p> "> Figure 13
<p>ROC curves for continuous authentication—single point-and-click action.</p> "> Figure 14
<p>ROC curves for continuous authentication—set of mouse movement and point-and-click actions.</p> "> Figure 15
<p>ROC curves for anomaly detection—single mouse movement action.</p> "> Figure 16
<p>ROC curves for anomaly detection—single point-and-click action.</p> "> Figure 17
<p>ROC curves for anomaly detection—set of mouse movement and point-and-click actions.</p> ">
Abstract
:1. Introduction
- An overview of existing techniques related to CA and AD is given, as well as the methods in which these have been used.
- A new online mouse dynamics dataset was developed. Our dataset of 20 participants contained a combination of mouse movement and point-click actions.
- Approximately 87 features were extracted from raw mouse data.
- A new DL model for CA and AD that verifies the legitimacy of a user was developed.
- The results of extensive experiments conducted to validate different proposed approaches. Techniques of classifications including KNN, DT, RF, and CNN models were used. The proposed DL model achieved a high level of accuracy.
- A comparison of our work with the existing methods is given.
2. Background and Related Work
- Number of users: The number of users that participated.
- Data period: The time of gathering the user’s information.
- Environment: The place of collecting mouse behavior data.
- Mouse action: Characteristics of the actions received from the mouse input device for a specific user while interacting with a specific graphical user interface.
- Type of Study: Continuous authentication, intrusion detection, or static authentication.
- Data used: The dataset that was used for this study.
- FAR: False acceptance rate.
- FRR: False rejection rate.
- EER: Equal error rate.
- Note: Additional information.
3. Data Collection: The Cyber Identity and Biometrics Lab: Mouse Dynamics Dataset
3.1. Dataset Mouse Recording Software
3.2. Participants
3.3. Running Participants
3.4. Raw Data Description
3.5. Segmentation
3.6. Data Preprocessing
3.6.1. Time-Series Dataset Generation
3.6.2. Feature Extraction
Mouse Movement Action Features
Point-and-Click Action Features
4. Methodology and Behavioral Biometrics Model
- Data collection phase: Raw data of the users are collected.
- Features extraction phase: Pandas and numpy were used for feature extraction.
- Data preparation phase: For the training phase, all the users’ data were aggregated and put in random order. The training dataset was then split into two parts: the first part (80% of the data) was used for training, and the second part (20% of the data) was used for testing the model’s performance. For every experiment, the balance of training sets and evaluation sets remained the same in order to avoid classifier bias.
- Select a classifier phase: DT, RF, KNN, and CNN were utilized to show the ability of the proposed model to determine whether a user was genuine or an impostor from a user’s mouse clickstream data.
- Training data phase: The training process began by reading the characteristics of all the users from the training dataset and then loading them into the four classifiers to train the model. This step was a significant step since the training data contained the user behavior itself and a class label.
- Testing data phase: After completion of the training step, the model was tested on the new data that were never used for training, in order to categorize whether the user was a genuine user or an impostor.
5. Implementation and Experiment Results
5.1. Phase 1: Continuous Authentication Phase
5.2. Phase 2: Anomaly Detection Phase
6. Experiment Evaluation
6.1. Continuous Authentication Evaluation
6.2. Anomaly Detection Evaluation
6.3. Comparison with the State-of-the-Art
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Ahmed, A.A.E.; Traore, I. A New Biometric Technology Based on Mouse Dynamics. IEEE Trans. Dependable Secur. Comput. 2007, 4, 165–179. [Google Scholar] [CrossRef]
- Chiasson, S.; Forget, A.; Stobert, E.; van Oorschot, P.C.; Biddle, R. Multiple Password Interference in Text and Click-Based Graphical Passwords. 11. In Proceedings of the 16th ACM conference on Computer and communications security (CCS ’09), Chicago, IL, USA, 9–13 November 2009; pp. 500–511. [Google Scholar]
- Chong, P.; Elovici, Y.; Binder, A. User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. IEEE Trans. Inf. Forensics Secur. 2020, 15, 1086–1101. [Google Scholar] [CrossRef]
- Enström, O. Authentication Using Deep Learning on User Generated Mouse Movement Images. 2019. Available online: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74203 (accessed on 8 April 2021).
- Guglielmo, L.; Geiger, S.; Burns, C.; Bondalapati, R.; Sidaras-Tirrito, M. Using Mouse Movement Biometrics to Authenticate Students Taking Online Multiple-Choice Exams. 7. Available online: https://www.semanticscholar.org/paper/Using-Mouse-Movement-Biometrics-to-Authenticate-Guglielmo-Geiger/c41a609c5eb3f5a53cfcfa9ec4250c7e24dda999 (accessed on 8 April 2021).
- Lecun, Y.; Bottou, L.; Bengio, Y.; Haffner, P. Gradient-based learning applied to document recognition. Proc. IEEE 1998, 86, 2278–2324. [Google Scholar] [CrossRef] [Green Version]
- Wolf, T.; Babaee, M.; Rigoll, G. Multi-view gait recognition using 3D convolutional neural networks. In Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA, 25–28 September 2016; pp. 4165–4169. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, A.A.E.; Traore, I. Anomaly intrusion detection based on biometrics. In Proceedings of the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, West Point, NY, USA, 31 March–1 April 2005; pp. 452–453. [Google Scholar] [CrossRef]
- Chudá, D.; Krátky, P. Usage of computer mouse characteristics for identification in web browsing. In Proceedings of the 15th International Conference on Computer Systems and Technologies-CompSysTech’14, Ruse, Bulgaria, 27–28 June 2014; pp. 218–225. [Google Scholar] [CrossRef]
- Yampolskiy, R.V. Human Computer Interaction Based Intrusion Detection. In Proceedings of the Fourth International Conference on Information Technology (ITNG’07), Las Vegas, NV, USA, 2–4 April 2007; pp. 837–842. [Google Scholar] [CrossRef]
- Passerini, E.; Paleari, R.; Martignoni, L. How Good Are Malware Detectors at Remediating Infected Systems?. In Detection of Intrusions and Malware, and Vulnerability Assessment; Flegel, U., Bruschi, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 21–37. [Google Scholar] [CrossRef]
- Shen, C.; Cai, Z.; Guan, X.; Du, Y.; Maxion, R.A. User Authentication Through Mouse Dynamics. IEEE Trans. Inf. Forensics Secur. 2013, 8, 16–30. [Google Scholar] [CrossRef]
- Chauhan, V.; Pilaniya, A.; Middha, V.; Gupta, A.; Bana, U.; Prasad, B.R.; Agarwal, S. Anomalous behavior detection in social networking. In Proceedings of the 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, India, 3–5 July 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Jain, A.K.; Hong, L.; Pankanti, S.; Bolle, R. An identity-authentication system using fingerprints. Proc. IEEE 1997, 85, 1365–1388. [Google Scholar] [CrossRef] [Green Version]
- Liu, S.; Silverman, M. A practical guide to biometric security technology. IT Prof. 2001, 3, 27–32. [Google Scholar] [CrossRef]
- Chuda, D.; Kratky, P.; Tvarozek, J. Mouse Clicks Can Recognize Web Page Visitors! In Proceedings of the 24th International Conference on World Wide Web-WWW ’15 Companion, Florence, Italy, 18–22 May 2015; pp. 21–22. [Google Scholar] [CrossRef]
- Hamid, N.A.; Safei, S.; Satar, S.D.M.; Chuprat, S.; Ahmad, R. Mouse movement behavioral biometric systems. In Proceedings of the International Conference on User Science and Engineering (i-USEr), Selangor, Malaysia, 29 November–1 December 2011; pp. 206–211. [Google Scholar] [CrossRef]
- Hashia, S.; Pollett, C.; Stamp, M. On Using Mouse Movements as a Biometric. 5. In Proceedings of the International Conference on Computer Science and its Applications, Singapore, 9–12 May 2005. [Google Scholar]
- Gamboa, H.; Fred, A. A Behavioural Biometric System Based on Human Computer Interaction. Proc. SPIE 2004, 5404, 381–392. [Google Scholar] [CrossRef]
- Pusara, M.; Brodley, C.E. User re-authentication via mouse movements. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security-VizSEC/DMSEC ’04, Washington, DC, USA, 29 October 2004. [Google Scholar] [CrossRef]
- Ahmed, A.A.E.; Traore, I. Dynamic sample size detection in continuous authentication using sequential sampling. In Proceedings of the 27th Annual Computer Security Applications Conference, Orlando, FL, USA, 5–9 December 2011; pp. 169–176. [Google Scholar] [CrossRef]
- Antal, M.; Egyed-Zsigmond, E. Intrusion detection using mouse dynamics. IET Biom. 2019, 8, 285–294. [Google Scholar] [CrossRef] [Green Version]
- Fülöp, Á.; Kovács, L.; Kurics, T.; Windhager-Pokol, E. Balabit Mouse Dynamics Challenge Data Set. 2016. Available online: https://medium.com/balabit-unsupervised/releasing-the-balabit-mouse-dynamics-challenge-data-set-a15a016fba6c (accessed on 8 May 2021).
- Tan, Y.X.M.; Iacovazzi, A.; Homoliak, I.; Elovici, Y.; Binder, A. Adversarial attacks on remote user authentication using behavioural mouse dynamics. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 14–19 July 2019; pp. 1–10. [Google Scholar]
- da Silva, V.R.; Costa-Abreu, M.D. An empirical biometric-based study for user identification with different neural networks in the online game League of Legends. In Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Zheng, N.; Paloski, A.; Wang, H. An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics. ACM Trans. Inf. Syst. Secur. 2016, 18, 1–27. [Google Scholar] [CrossRef]
- Feher, C.; Elovici, Y.; Moskovitch, R.; Rokach, L.; Schclar, A. User identity verification via mouse dynamics. Inf. Sci. 2012, 201, 19–36. [Google Scholar] [CrossRef] [Green Version]
- Sayed, B.; Traore, I.; Woungang, I.; Obaidat, M.S. Biometric Authentication Using Mouse Gesture Dynamics. IEEE Syst. J. 2013, 7, 262–274. [Google Scholar] [CrossRef]
- Shen, C.; Cai, Z.; Guan, X.; Maxion, R. Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 2014, 45, 156–171. [Google Scholar] [CrossRef]
- Zheng, N.; Paloski, A.; Wang, H. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM Conference on Computer and Communications Security-CCS ’11, Chicago, IL USA, 17 October 2011; pp. 1–27. [Google Scholar] [CrossRef]
- Shen, C.; Cai, Z.; Guan, X. Continuous authentication for mouse dynamics: A pattern-growth approach. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, USA, 25–28 June 2012; pp. 1–12. [Google Scholar] [CrossRef]
- Bailey, K.O.; Okolica, J.S.; Peterson, G.L. User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 2014, 43, 77–89. [Google Scholar] [CrossRef]
- Mondal, S.; Bours, P. Continuous Authentication in a real world settings. In Proceedings of the 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR), Kolkata, India, 4–7 January 2015; pp. 1–6. [Google Scholar] [CrossRef]
- pyHook. 2021. Available online: https://pypi.org/project/pyHook/ (accessed on 8 April 2021).
- Simonyan, K.; Zisserman, A. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv 2015, arXiv:1409.1556. [Google Scholar]
- Jovic, A.; Brkic, K.; Bogunovic, N. An overview of free software tools for general data mining. In Proceedings of the 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 26–30 May 2014; pp. 1112–1117. [Google Scholar] [CrossRef]
- Almalki, S.; Chatterjee, P.; Roy, K. Continuous Authentication Using Mouse Clickstream Data Analysis. In Security, Privacy, and Anonymity in Computation, Communication, and Storage; Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; Volume 11637, pp. 76–85. [Google Scholar] [CrossRef]
- Salman, O.A.; Hameed, S.M. Using Mouse Dynamics for Continuous User Authentication. In Proceedings of the Future Technologies Conference (FTC) 2018; Arai, K., Bhatia, R., Kapoor, S., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; Volume 880, pp. 776–787. [Google Scholar] [CrossRef]
- Damousis, I.G.; Argyropoulos, S. Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study. Appl. Comput. Intell. Soft Comput. 2012, 2012, 242401. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, A.A.E.; Traore, I. Mouse Dynamics Biometric Technology; Behavioral Biometrics for Human Identification: Intelligent Applications; IGI Global: Hershey, PA, USA, 2010. [Google Scholar] [CrossRef]
Paper | # User | Data Period | Environment | Action | Type of Study | Dataset Used | FRR | FAR | EER | Note |
---|---|---|---|---|---|---|---|---|---|---|
[26] | 30 | 1–2 weeks | Controlled | MM-PC | Continuous Authentication | Collected | 0.86% | 2.96% | 1.3% | 25 clicks |
[27] | 25 | N/A | Uncontrolled | MM-PC-DD | Continuous Authentication | Collected | 17.66% | Not given | 8.53% | 30 actions |
[22] | 10 | N/A | Uncontrolled | MM-PC-DD | Intrusion detection | Balabit | N/A | N/A | 0.04% | 20 actions |
[28] | 39 | N/A | Controlled | MM | Static authentication | Collected | 5.26% | 4.59% | N/A | 4 gestures |
[29] | 58 | N/A | Controlled | MM-PC | Anomaly detection | Collected | N/A | N/A | 11.63% | 16.1 s |
[30] | 30 | 37 min | Uncontrolled | MM-PC | Continuous authentication | Collected | 1.3% | 1.3% | 1.3% | 20 clicks |
[31] | 28 | 5/10 min | Uncontrolled | MM-PC-DD | Continuous authentication | Collected | 7.78–2.75% | 9.45–3.39% | N/A | N/A |
[32] | 31 | 1 day | Controlled | MM-PC-DD | Continuous | Collected | 2.10% | 2.24% | N/A | N/A |
[33] | 52 | One week | Uncontrolled | MM-PC-DD | Continuous | Collected | N/A | N/A | N/A | N/A |
[20] | 50 | 10–15 min | Controlled | MM-PC | Static authentication | Collected | 2% | 2% | 0.020 | 50 strokes |
Name | Mouse Movement Action | Point and Click Action | # Features | |
---|---|---|---|---|
Press Action | Release Action | |||
Velocity along x-axis | 1 | |||
Velocity along x-axis (mean, max, min, SD, variance) | 10 | |||
Velocity along y-axis | 1 | |||
Velocity along y-axis (mean, max, min, SD, variance) | 10 | |||
Velocity over the mouse (x-y) plane | 1 | |||
Velocity over the mouse (x-y) plane (mean, max, min, SD, variance) | 10 | |||
Angular velocity | 1 | |||
Acceleration along x-axis | 1 | |||
Acceleration along y-axis | 1 | |||
Acceleration over the mouse (x-y) plane | 1 | |||
Acceleration over the mouse (x-y) plane (mean, max, min, SD, variance) | 10 | |||
Jerk along x-axis | 1 | |||
Jerk along y-axis | 1 | |||
Jerk over the mouse (x-y) plane | 1 | |||
Jerk over the mouse (x-y) plane (mean, max, min, SD, variance) | 10 | |||
Angular movement | 3 | |||
Distance travelled | 3 | |||
Angle of curvature | 1 | |||
Curvature change rate | 1 | |||
Curvature change rate (mean, max, min, SD, variance) | 10 | |||
Length of trajectory | 2 | |||
Straightness of trajectory | 2 | |||
Elapsed time | 2 | |||
Mouse movement action | 1 | |||
Press action | 1 | |||
Release action | 1 | |||
Total | 87 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
Accuracy | 98.0 | 94.6 | 97.9 | 98.8 |
Recall | 93.8 | 93.7 | 94.2 | 96.3 |
Precision | 95.9 | 92.8 | 96.0 | 97.9 |
F1-score | 90.8 | 92.7 | 94.4 | 95.5 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
Accuracy | 82.7 | 83.3 | 96.1 | 95.2 |
Recall | 80.2 | 82.7 | 95.3 | 95.4 |
Precision | 81.1 | 81.5 | 93.7 | 94.2 |
F1-score | 82.5 | 82.6 | 93.9 | 95.1 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
Accuracy | 96.7 | 94.2 | 97.2 | 96.9 |
Recall | 91.2 | 90.2 | 97.1 | 94.4 |
Precision | 93.1 | 93.7 | 93.3 | 92.2 |
F1-score | 95.5 | 93.6 | 92.9 | 90.1 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
Accuracy | 98.2 | 92.2 | 98.0 | 98.5 |
Recall | 97.8 | 90.7 | 96.2 | 97.3 |
Precision | 93.9 | 90.8 | 97.0 | 97.1 |
F1-score | 95.6 | 91.7 | 95.4 | 95.7 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
Accuracy | 93.1 | 83.5 | 95.4 | 88.6 |
Recall | 90.2 | 80.7 | 93.1 | 85.2 |
Precession | 89.1 | 81.6 | 92.8 | 86.8 |
F1-score | 91.5 | 81.4 | 93.6 | 82.9 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
Accuracy | 89.4 | 74.1 | 92.1 | 85.7 |
Recall | 87.2 | 72.2 | 91.1 | 85.4 |
Precision | 86.7 | 71.7 | 92.4 | 84.2 |
F1-score | 84.3 | 72.6 | 90.2 | 83.1 |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
FAR | 0.009% | 0.011% | 0.010% | 0.052% |
FRR | 0.182% | 0.670% | 0.208% | 0.999% |
EER | 0.028% | 0.327% | 0.023% | 0.021% |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
FAR | 0.025% | 0.015% | 0.012% | 0.051% |
FRR | 0.513% | 0.311% | 0.027% | 0.918% |
EER | 0.229% | 0.220% | 0.068% | 0.107% |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
FAR | 0.031% | 0.002% | 0.032% | 0.052% |
FRR | 0.608% | 0.007% | 0.634% | 0.930% |
EER | 0.222% | 0.005% | 0.155% | 0.094% |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
FAR | 0.018% | 0.020% | 0.020% | 0.052% |
FRR | 0.349% | 0.389% | 0.383% | 0.990% |
EER | 0.045% | 0.210% | 0.035% | 0.032% |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
FAR | 0.017% | 0.018% | 0.016% | 0.050% |
FRR | 0.323% | 0.335% | 0.918% | 0.906% |
EER | 0.101% | 0.222% | 0.065% | 0.193% |
Classifier | KNN | DT | RF | CNN |
---|---|---|---|---|
FAR | 0.026% | 0.020% | 0.029% | 0.050% |
FRR | 0.537% | 0.603% | 0.510% | 0.945% |
EER | 0.163% | 0.349% | 0.111% | 0.234% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almalki, S.; Assery, N.; Roy, K. An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis. Appl. Sci. 2021, 11, 6083. https://doi.org/10.3390/app11136083
Almalki S, Assery N, Roy K. An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis. Applied Sciences. 2021; 11(13):6083. https://doi.org/10.3390/app11136083
Chicago/Turabian StyleAlmalki, Sultan, Nasser Assery, and Kaushik Roy. 2021. "An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis" Applied Sciences 11, no. 13: 6083. https://doi.org/10.3390/app11136083
APA StyleAlmalki, S., Assery, N., & Roy, K. (2021). An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis. Applied Sciences, 11(13), 6083. https://doi.org/10.3390/app11136083