Skip to main content

User Identification by Observing Interactions with GUIs

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10132))

Abstract

Given our increasing reliance on computing devices, the security of such devices becomes ever more important. In this work, we are interested in exploiting user behaviour as a means of reducing the potential for masquerade attacks, which occur when an intruder manages to breach the system and act as an authorised user. This could be possible by using stolen passwords or by taking advantage of unlocked, unattended devices. Once the attacker has passed the authentication step, they may have full access to that machine including any private data and software. Continuous identification can be used as an effective way to prevent such attacks, where the identity of the user is checked continuously throughout the session. In addition to security purposes, a reliable dynamic identification system would be of interest for user profiling and recommendation. In this paper, we present a method for user identification which relies on modeling the behaviours of a user when interacting with the graphical user interface of a computing device. A publicly-available logging tool has been developed specifically to passively capture human-computer interactions. Two experiments have been conducted to evaluate the model, and the results show the effectiveness and reliability of the method for the dynamic user identification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Secur. Comput. 4(3), 165–179 (2007)

    Article  Google Scholar 

  2. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. (2002)

    Google Scholar 

  3. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367–397 (2002)

    Article  Google Scholar 

  4. Boies, S.J.: User behaviour on an interactive computer system. IBM Syst. J. 13, 2–18 (1974)

    Article  Google Scholar 

  5. Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory, COLT 1992, pp. 144–152. ACM, New York (1992)

    Google Scholar 

  6. Carmagnola, F., Cena, F.: User identification for cross-system personalisation. Inf. Sci. 179(1–2), 16–32 (2009)

    Article  Google Scholar 

  7. Curtin, M., Villani, M., Ngo, G., Simone, J., Fort, H.S., Cha, S.: Keystroke biometric recognition on long-text input: a feasibility study. In: International Workshop on Scientific Computing and Computational Statistics (2006)

    Google Scholar 

  8. Garg, A., Rahalkar, R., Upadhyaya, S., Kwiaty, K.: Profiling users in GUI based systems for masquerade detection. In: 2006 IEEE Information Assurance Workshop, pp. 48–54 (2006)

    Google Scholar 

  9. Goldring, T.: User profiling for intrusion detection in windows NT. Comput. Sci. Stat. 35 (2003)

    Google Scholar 

  10. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)

    Article  MATH  Google Scholar 

  11. Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements curves. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015. LNCS, vol. 8936, pp. 111–122. Springer, Heidelberg (2015). doi:10.1007/978-3-319-14442-9_10

    Google Scholar 

  12. Hinbarji, Z., Albatal, R., O’Connor, N.E., Gurrin, C.: LoggerMan, a comprehensive logging and visualization tool to capture computer usage. In: Tian, Q., Sebe, N., Qi, G.-J., Huet, B., Hong, R., Liu, X. (eds.) MMM 2016. LNCS, vol. 9517, pp. 342–347. Springer, Heidelberg (2016). doi:10.1007/978-3-319-27674-8_31

    Chapter  Google Scholar 

  13. Kaufman, K.A., Cervone, G., Michalski, R.S.: An application of symbolic learning to intrusion detection: preliminary results from the LUS methodology. Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA (2003)

    Google Scholar 

  14. Lane, T., Brodley., C.: An application of machine learning to anomaly detection. In: Proceedings of the 20th National Information Systems Security Conference, pp. 366–377 (1997)

    Google Scholar 

  15. Maxion, R., Townsend, T.: Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, DSN 2002, pp. 219–228 (2002)

    Google Scholar 

  16. Pannell, G., Ashman, H.: Anomaly detection over user profiles for intrusion detection (2010)

    Google Scholar 

  17. Ryan, J., Jang Lin, M., Miikkulainen, R.: Intrusion detection with neural networks. In: Advances in Neural Information Processing Systems, pp. 943–949. MIT Press (1998)

    Google Scholar 

  18. Schonlau, M., Dumouchel, W., Ju, W.-H., Karr, A.F., Theusan, M., Vardi, Y.: Computer intrusion: detecting masquerades. Stat. Sci. 16(1), 58–74 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  19. Dao, V., Vemuri, R., Templeton, S.: Profiling users in the UNIX OS environment. In: International ICSC Conference on Intelligent Systems and Applications (2000)

    Google Scholar 

  20. Yeung, Y.D., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recogn. 36, 229–243 (2003)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This publication has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) under grant number SFI/12/RC/2289.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zaher Hinbarji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hinbarji, Z., Albatal, R., Gurrin, C. (2017). User Identification by Observing Interactions with GUIs. In: Amsaleg, L., Guðmundsson, G., Gurrin, C., Jónsson, B., Satoh, S. (eds) MultiMedia Modeling. MMM 2017. Lecture Notes in Computer Science(), vol 10132. Springer, Cham. https://doi.org/10.1007/978-3-319-51811-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51811-4_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51810-7

  • Online ISBN: 978-3-319-51811-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics