An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
In the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Anyone using the intranet computer may access content that he does not have permission to access. For an insider attacker, it is relatively easy to steal a...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2019/3898951 |
id |
doaj-4cc6205de79742f2b482e466855588c5 |
---|---|
record_format |
Article |
spelling |
doaj-4cc6205de79742f2b482e466855588c52020-11-25T02:14:51ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222019-01-01201910.1155/2019/38989513898951An Insider Threat Detection Approach Based on Mouse Dynamics and Deep LearningTeng Hu0Weina Niu1Xiaosong Zhang2Xiaolei Liu3Jiazhong Lu4Yuan Liu5Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731, ChinaCollege of Cybersecurity, Sichuan University, Chengdu, Sichuan, ChinaCenter for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, ChinaCenter for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731, ChinaInstitute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan, 621900, ChinaIn the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Anyone using the intranet computer may access content that he does not have permission to access. For an insider attacker, it is relatively easy to steal a colleague’s password or use an unattended computer to launch an attack. A common one-time user authentication method may not work in this situation. In this paper, we propose a user authentication method based on mouse biobehavioral characteristics and deep learning, which can accurately and efficiently perform continuous identity authentication on current computer users, thus to address insider threats. We used an open-source dataset with ten users to carry out experiments, and the experimental results demonstrated the effectiveness of the approach. This approach can complete a user authentication task approximately every 7 seconds, with a false acceptance rate of 2.94% and a false rejection rate of 2.28%.http://dx.doi.org/10.1155/2019/3898951 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Teng Hu Weina Niu Xiaosong Zhang Xiaolei Liu Jiazhong Lu Yuan Liu |
spellingShingle |
Teng Hu Weina Niu Xiaosong Zhang Xiaolei Liu Jiazhong Lu Yuan Liu An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning Security and Communication Networks |
author_facet |
Teng Hu Weina Niu Xiaosong Zhang Xiaolei Liu Jiazhong Lu Yuan Liu |
author_sort |
Teng Hu |
title |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning |
title_short |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning |
title_full |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning |
title_fullStr |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning |
title_full_unstemmed |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning |
title_sort |
insider threat detection approach based on mouse dynamics and deep learning |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2019-01-01 |
description |
In the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Anyone using the intranet computer may access content that he does not have permission to access. For an insider attacker, it is relatively easy to steal a colleague’s password or use an unattended computer to launch an attack. A common one-time user authentication method may not work in this situation. In this paper, we propose a user authentication method based on mouse biobehavioral characteristics and deep learning, which can accurately and efficiently perform continuous identity authentication on current computer users, thus to address insider threats. We used an open-source dataset with ten users to carry out experiments, and the experimental results demonstrated the effectiveness of the approach. This approach can complete a user authentication task approximately every 7 seconds, with a false acceptance rate of 2.94% and a false rejection rate of 2.28%. |
url |
http://dx.doi.org/10.1155/2019/3898951 |
work_keys_str_mv |
AT tenghu aninsiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT weinaniu aninsiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT xiaosongzhang aninsiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT xiaoleiliu aninsiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT jiazhonglu aninsiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT yuanliu aninsiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT tenghu insiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT weinaniu insiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT xiaosongzhang insiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT xiaoleiliu insiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT jiazhonglu insiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning AT yuanliu insiderthreatdetectionapproachbasedonmousedynamicsanddeeplearning |
_version_ |
1724899321724272640 |