US20040221171A1 - Intrusion detector based on mouse dynamics analysis - Google Patents

Intrusion detector based on mouse dynamics analysis Download PDF

Info

Publication number
US20040221171A1
US20040221171A1 US10/427,810 US42781003A US2004221171A1 US 20040221171 A1 US20040221171 A1 US 20040221171A1 US 42781003 A US42781003 A US 42781003A US 2004221171 A1 US2004221171 A1 US 2004221171A1
Authority
US
United States
Prior art keywords
mouse
mouse dynamics
signature
dynamics
movement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/427,810
Inventor
Ahmed Awad Ahmed
Issa Traore
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/427,810 priority Critical patent/US20040221171A1/en
Priority to US10/555,408 priority patent/US8230232B2/en
Priority to PCT/CA2004/000669 priority patent/WO2004097601A1/en
Priority to CA2535542A priority patent/CA2535542C/en
Publication of US20040221171A1 publication Critical patent/US20040221171A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Definitions

  • Biometric based detectors are considered of the most fast and accurate detectors, in this patent we introduce a new biometric detector, mouse dynamics detector.
  • the detector functionality is to observe the user behavior, acquire input data, and analyze it in order to produce a list of factors characterizing the user behavior.
  • FIG. 1 illustrates the generation of a mouse dynamics signature.
  • FIG. 2 a shows a comparison of two mouse dynamics signatures for the same user.
  • FIG. 2 b shows a comparison of mouse dynamics signatures for two different users.
  • mouse actions are recorded and processed on a real time basis, movement characteristics being analyzed to produce a set of factors characterizing the behavior, the aim of the research work in this area is to produce what is called a mouse dynamics signature for each registered user.
  • This signature is constructed from a set of factors describing the user behavior, using this signature the system will be able to detect if unauthorized user is using the system.
  • Mouse input actions can be classified as follows:
  • the analysis can be divided into two categories, movement analysis, and silence analysis; different approaches are used in each category to collect the factors characterizing it.
  • Factors collected from the above mentioned analysis are passed to a detection unit which uses neural networks to compare the collected input data against a pre analyzed heuristic information, produce what we call ‘suspicious ratio’, and apply a decision making algorithm to propose the proper action.
  • mouse dynamics signature is the traveled distance/movement speed curve (FIG. 1), a neural network is used to model this curve, the network is trained with the collected raw data, mouse dynamics signature is a curve generated from the output (movement speed) of the trained network against an input presenting the full spectrum of the traveled distances.
  • a learning/tuning algorithm is used to improve the efficiency of the system for a reliable and accurate detection, and decrease the false acceptance/rejection ratios.
  • FIG. 2 shows an example of the comparison process for two different cases
  • FIG. 2 a shows a recorded mouse dynamics signature compared to reference signature of the same user
  • FIG. 2 b shows a recorded mouse dynamics signature of an intruder compared to reference signature of the logged in user.
  • Intrusion is detected if the difference between the curves is over a pre calculated threshold limit.

Abstract

A biometric intrusion detection system based on mouse dynamics analysis, the analysis of mouse dynamics for a specific user generates a number of factors (Mouse Dynamics Signature) which can be used to ensure the identity of the user, an intelligent detection technique is developed to recognize differences in behaviors and detect intrusion.

Description

    BACKGROUND OF THE INVENTION
  • The main focus of this research is the development of an intelligent intrusion detection system that utilizes user biometric information in the identification and verification processes. [0001]
  • Biometric based detectors are considered of the most fast and accurate detectors, in this patent we introduce a new biometric detector, mouse dynamics detector. The detector functionality is to observe the user behavior, acquire input data, and analyze it in order to produce a list of factors characterizing the user behavior. [0002]
  • BRIEF SUMMARY OF THE INVENTION
  • By monitoring mouse dynamics information, and analyzing the characteristics of this input over different sessions it is possible to calculate a user identification signature that can be used to ensure the user identity and detect any possible intrusion or misuse of the system.[0003]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates the generation of a mouse dynamics signature. [0004]
  • FIG. 2[0005] a shows a comparison of two mouse dynamics signatures for the same user.
  • FIG. 2[0006] b shows a comparison of mouse dynamics signatures for two different users.
  • DETAILED DESCRIPTION OF THE INVENTION
  • 1. Mouse Movement Analysis [0007]
  • In this detector mouse actions are recorded and processed on a real time basis, movement characteristics being analyzed to produce a set of factors characterizing the behavior, the aim of the research work in this area is to produce what is called a mouse dynamics signature for each registered user. [0008]
  • This signature is constructed from a set of factors describing the user behavior, using this signature the system will be able to detect if unauthorized user is using the system. [0009]
  • 2. Classification of Actions [0010]
  • Mouse input actions can be classified as follows: [0011]
  • Movement (General Movement) [0012]
  • Drag and Drop (the action starts with mouse button down, movement, then mouse button up) [0013]
  • Point & Click (mouse movement followed by a click or double click) [0014]
  • Silence (No Movement) [0015]
  • From the above mentioned classification, the analysis can be divided into two categories, movement analysis, and silence analysis; different approaches are used in each category to collect the factors characterizing it. [0016]
  • Following are some examples on the type of factors collected from each analysis. [0017]
  • Movement Analysis Examples: [0018]
  • Calculating the average speed compared to the traveled distance, this produces three graphs for the 3 types of movement actions [0019]
  • Calculating average speed compared to the movement direction, 8 different directions are considered [0020]
  • Calculating the average traveled distance for a specific period of time, with regards to different movement directions; from this data we can build a pattern for the use of different directions. [0021]
  • Silence Analysis Examples: [0022]
  • Calculating the average of silence periods between movements [0023]
  • Calculating amount of silence in a period of time [0024]
  • Comparing the percentage of the silence time to movement time in a period of time [0025]
  • Determining weights for different movement directions to answer the following questions: [0026]
  • What is the major movement direction to start movement after a silence period [0027]
  • What is the major movement direction to end with before a silence period [0028]
  • Factors collected from the above mentioned analysis are passed to a detection unit which uses neural networks to compare the collected input data against a pre analyzed heuristic information, produce what we call ‘suspicious ratio’, and apply a decision making algorithm to propose the proper action. [0029]
  • An example of the mouse dynamics signature is the traveled distance/movement speed curve (FIG. 1), a neural network is used to model this curve, the network is trained with the collected raw data, mouse dynamics signature is a curve generated from the output (movement speed) of the trained network against an input presenting the full spectrum of the traveled distances. [0030]
  • A learning/tuning algorithm is used to improve the efficiency of the system for a reliable and accurate detection, and decrease the false acceptance/rejection ratios. [0031]
  • FIG. 2 shows an example of the comparison process for two different cases, FIG. 2[0032] a shows a recorded mouse dynamics signature compared to reference signature of the same user, and FIG. 2b shows a recorded mouse dynamics signature of an intruder compared to reference signature of the logged in user.
  • Intrusion is detected if the difference between the curves is over a pre calculated threshold limit. [0033]

Claims (2)

1. By monitoring and analyzing mouse dynamics for a specific user over a period of time it is possible to produce what is called a ‘Mouse Dynamics Signature’, Mouse Dynamics Signature is a set of curves describing the monitored behavior and characterizing the mouse dynamics of the user over that period of time.
2. By continuously monitoring mouse dynamics on an active workstation, and comparing the calculated mouse dynamics signature over a period of time to the stored mouse signature of the user who is logged in to the workstation it is possible to detect intrusion.
US10/427,810 2003-05-02 2003-05-02 Intrusion detector based on mouse dynamics analysis Abandoned US20040221171A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US10/427,810 US20040221171A1 (en) 2003-05-02 2003-05-02 Intrusion detector based on mouse dynamics analysis
US10/555,408 US8230232B2 (en) 2003-05-02 2004-05-03 System and method for determining a computer user profile from a motion-based input device
PCT/CA2004/000669 WO2004097601A1 (en) 2003-05-02 2004-05-03 System and method for determining a computer user profile from a motion-based input device
CA2535542A CA2535542C (en) 2003-05-02 2004-05-03 System and method for determining a computer user profile from a motion-based input device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/427,810 US20040221171A1 (en) 2003-05-02 2003-05-02 Intrusion detector based on mouse dynamics analysis

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US10/555,408 Continuation-In-Part US8230232B2 (en) 2003-05-02 2004-05-03 System and method for determining a computer user profile from a motion-based input device
US10555408 Continuation-In-Part 2004-05-03

Publications (1)

Publication Number Publication Date
US20040221171A1 true US20040221171A1 (en) 2004-11-04

Family

ID=33310267

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/427,810 Abandoned US20040221171A1 (en) 2003-05-02 2003-05-02 Intrusion detector based on mouse dynamics analysis
US10/555,408 Active 2025-02-16 US8230232B2 (en) 2003-05-02 2004-05-03 System and method for determining a computer user profile from a motion-based input device

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/555,408 Active 2025-02-16 US8230232B2 (en) 2003-05-02 2004-05-03 System and method for determining a computer user profile from a motion-based input device

Country Status (3)

Country Link
US (2) US20040221171A1 (en)
CA (1) CA2535542C (en)
WO (1) WO2004097601A1 (en)

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050008148A1 (en) * 2003-04-02 2005-01-13 Dov Jacobson Mouse performance identification
US20060023709A1 (en) * 2004-08-02 2006-02-02 Hall Michael L Inline intrusion detection using a single physical port
US20060161983A1 (en) * 2005-01-20 2006-07-20 Cothrell Scott A Inline intrusion detection
US20060224898A1 (en) * 2003-05-02 2006-10-05 Ahmed Ahmed E System and method for determining a computer user profile from a motion-based input device
EP2069993A2 (en) * 2006-10-04 2009-06-17 Behaviometrics AB Security system and method for detecting intrusion in a computerized system
US7562389B1 (en) 2004-07-30 2009-07-14 Cisco Technology, Inc. Method and system for network security
EP2382736A2 (en) * 2009-01-23 2011-11-02 Microsoft Corporation Passive security enforcement
US8209758B1 (en) 2011-12-21 2012-06-26 Kaspersky Lab Zao System and method for classifying users of antivirus software based on their level of expertise in the field of computer security
US8214904B1 (en) 2011-12-21 2012-07-03 Kaspersky Lab Zao System and method for detecting computer security threats based on verdicts of computer users
US8214905B1 (en) 2011-12-21 2012-07-03 Kaspersky Lab Zao System and method for dynamically allocating computing resources for processing security information
EP2584488A1 (en) 2011-09-20 2013-04-24 Kaspersky Lab Zao System and method for detecting computer security threats based on verdicts of computer users
CN104252595A (en) * 2013-06-28 2014-12-31 贝壳网际(北京)安全技术有限公司 Application program analysis method and device and client
US20150178374A1 (en) * 2013-12-23 2015-06-25 Trusteer Ltd. Method and system of providing user profile detection from an input device
CN108460269A (en) * 2018-03-21 2018-08-28 广州多益网络股份有限公司 Verification method and device, verification terminal device
US10262324B2 (en) 2010-11-29 2019-04-16 Biocatch Ltd. System, device, and method of differentiating among users based on user-specific page navigation sequence
US10298614B2 (en) * 2010-11-29 2019-05-21 Biocatch Ltd. System, device, and method of generating and managing behavioral biometric cookies
US10333917B2 (en) 2017-01-04 2019-06-25 International Business Machines Corporation Controlling access to electronic resources based on a user's sociometric identification document
US10397262B2 (en) 2017-07-20 2019-08-27 Biocatch Ltd. Device, system, and method of detecting overlay malware
US10404729B2 (en) 2010-11-29 2019-09-03 Biocatch Ltd. Device, method, and system of generating fraud-alerts for cyber-attacks
US10476873B2 (en) * 2010-11-29 2019-11-12 Biocatch Ltd. Device, system, and method of password-less user authentication and password-less detection of user identity
US10474815B2 (en) 2010-11-29 2019-11-12 Biocatch Ltd. System, device, and method of detecting malicious automatic script and code injection
US10523680B2 (en) * 2015-07-09 2019-12-31 Biocatch Ltd. System, device, and method for detecting a proxy server
US10579784B2 (en) 2016-11-02 2020-03-03 Biocatch Ltd. System, device, and method of secure utilization of fingerprints for user authentication
US10586036B2 (en) 2010-11-29 2020-03-10 Biocatch Ltd. System, device, and method of recovery and resetting of user authentication factor
US10621585B2 (en) 2010-11-29 2020-04-14 Biocatch Ltd. Contextual mapping of web-pages, and generation of fraud-relatedness score-values
US10685355B2 (en) 2016-12-04 2020-06-16 Biocatch Ltd. Method, device, and system of detecting mule accounts and accounts used for money laundering
US10719765B2 (en) 2015-06-25 2020-07-21 Biocatch Ltd. Conditional behavioral biometrics
US10728761B2 (en) 2010-11-29 2020-07-28 Biocatch Ltd. Method, device, and system of detecting a lie of a user who inputs data
US10747305B2 (en) 2010-11-29 2020-08-18 Biocatch Ltd. Method, system, and device of authenticating identity of a user of an electronic device
US20200279266A1 (en) * 2019-03-01 2020-09-03 Mastercard Technologies Canada ULC Multi-page online application origination (oao) service for fraud prevention systems
US10776476B2 (en) 2010-11-29 2020-09-15 Biocatch Ltd. System, device, and method of visual login
US10834590B2 (en) 2010-11-29 2020-11-10 Biocatch Ltd. Method, device, and system of differentiating between a cyber-attacker and a legitimate user
US10897482B2 (en) 2010-11-29 2021-01-19 Biocatch Ltd. Method, device, and system of back-coloring, forward-coloring, and fraud detection
US10917431B2 (en) 2010-11-29 2021-02-09 Biocatch Ltd. System, method, and device of authenticating a user based on selfie image or selfie video
US10949757B2 (en) 2010-11-29 2021-03-16 Biocatch Ltd. System, device, and method of detecting user identity based on motor-control loop model
US10949514B2 (en) 2010-11-29 2021-03-16 Biocatch Ltd. Device, system, and method of differentiating among users based on detection of hardware components
US10970394B2 (en) 2017-11-21 2021-04-06 Biocatch Ltd. System, device, and method of detecting vishing attacks
US11055395B2 (en) 2016-07-08 2021-07-06 Biocatch Ltd. Step-up authentication
US20210329030A1 (en) * 2010-11-29 2021-10-21 Biocatch Ltd. Device, System, and Method of Detecting Vishing Attacks
US11210674B2 (en) 2010-11-29 2021-12-28 Biocatch Ltd. Method, device, and system of detecting mule accounts and accounts used for money laundering
US11223619B2 (en) * 2010-11-29 2022-01-11 Biocatch Ltd. Device, system, and method of user authentication based on user-specific characteristics of task performance
US11269977B2 (en) 2010-11-29 2022-03-08 Biocatch Ltd. System, apparatus, and method of collecting and processing data in electronic devices
US11606353B2 (en) 2021-07-22 2023-03-14 Biocatch Ltd. System, device, and method of generating and utilizing one-time passwords
US11928683B2 (en) 2019-10-01 2024-03-12 Mastercard Technologies Canada ULC Feature encoding in online application origination (OAO) service for a fraud prevention system

Families Citing this family (147)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
JP4556103B2 (en) * 2004-02-24 2010-10-06 ソニー株式会社 Encryption apparatus and encryption method
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US20060136731A1 (en) * 2004-12-21 2006-06-22 Signaturelink, Inc. System and method for providing an online electronic signature
US8588483B2 (en) * 2004-12-21 2013-11-19 Signaturelink, Inc. System and method for providing a real-time, online biometric signature
US8438264B2 (en) * 2004-12-28 2013-05-07 At&T Intellectual Property I, L.P. Method and apparatus for collecting, analyzing, and presenting data in a communication network
US9323922B2 (en) 2005-01-06 2016-04-26 Oracle International Corporation Dynamically differentiating service in a database based on a security profile of a user
US9129226B2 (en) * 2011-12-04 2015-09-08 Beyondcore, Inc. Analyzing data sets with the help of inexpert humans to find patterns
US10127130B2 (en) 2005-03-18 2018-11-13 Salesforce.Com Identifying contributors that explain differences between a data set and a subset of the data set
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US20070255818A1 (en) * 2006-04-29 2007-11-01 Kolnos Systems, Inc. Method of detecting unauthorized access to a system or an electronic device
US20070261109A1 (en) * 2006-05-04 2007-11-08 Martin Renaud Authentication system, such as an authentication system for children and teenagers
US20070271466A1 (en) * 2006-05-18 2007-11-22 Genevieve Mak Security or authentication system and method using manual input measurements, such as via user manipulation of a computer mouse
US8051468B2 (en) * 2006-06-14 2011-11-01 Identity Metrics Llc User authentication system
US7818290B2 (en) 2006-06-14 2010-10-19 Identity Metrics, Inc. System to associate a demographic to a user of an electronic system
US8161530B2 (en) * 2006-07-11 2012-04-17 Identity Metrics, Inc. Behaviormetrics application system for electronic transaction authorization
US8843754B2 (en) * 2006-09-15 2014-09-23 Identity Metrics, Inc. Continuous user identification and situation analysis with identification of anonymous users through behaviormetrics
US8452978B2 (en) * 2006-09-15 2013-05-28 Identity Metrics, LLC System and method for user authentication and dynamic usability of touch-screen devices
US9026638B2 (en) * 2007-02-05 2015-05-05 Novell, Inc. Stealth entropy collection
KR101452704B1 (en) * 2007-02-14 2014-10-23 삼성전자주식회사 Method for setting up and authenticating password for a portable device having a plurality of buttons
US20090043812A1 (en) * 2007-08-06 2009-02-12 The Boeing Company Information assessment associate for checkpoint operations
US8176159B2 (en) * 2007-08-16 2012-05-08 Avaya Inc. Habit-based authentication
US9396331B2 (en) * 2008-04-22 2016-07-19 The 41St Parameter, Inc. Systems and methods for security management based on cursor events
JP5121681B2 (en) * 2008-04-30 2013-01-16 株式会社日立製作所 Biometric authentication system, authentication client terminal, and biometric authentication method
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US8204833B2 (en) * 2009-05-27 2012-06-19 Softroute Corporation Method for fingerprinting and identifying internet users
US8296425B2 (en) * 2009-12-14 2012-10-23 Electronics And Telecommunications Research Institute Method and system for lawful interception of internet service
US9361597B2 (en) 2010-10-19 2016-06-07 The 41St Parameter, Inc. Variable risk engine
US10069852B2 (en) 2010-11-29 2018-09-04 Biocatch Ltd. Detection of computerized bots and automated cyber-attack modules
US10032010B2 (en) * 2010-11-29 2018-07-24 Biocatch Ltd. System, device, and method of visual login and stochastic cryptography
US10055560B2 (en) 2010-11-29 2018-08-21 Biocatch Ltd. Device, method, and system of detecting multiple users accessing the same account
US10164985B2 (en) * 2010-11-29 2018-12-25 Biocatch Ltd. Device, system, and method of recovery and resetting of user authentication factor
US9531733B2 (en) 2010-11-29 2016-12-27 Biocatch Ltd. Device, system, and method of detecting a remote access user
US10037421B2 (en) 2010-11-29 2018-07-31 Biocatch Ltd. Device, system, and method of three-dimensional spatial user authentication
US9838373B2 (en) * 2010-11-29 2017-12-05 Biocatch Ltd. System, device, and method of detecting a remote access user
US9477826B2 (en) * 2010-11-29 2016-10-25 Biocatch Ltd. Device, system, and method of detecting multiple users accessing the same account
US9483292B2 (en) 2010-11-29 2016-11-01 Biocatch Ltd. Method, device, and system of differentiating between virtual machine and non-virtualized device
US10395018B2 (en) 2010-11-29 2019-08-27 Biocatch Ltd. System, method, and device of detecting identity of a user and authenticating a user
US9621567B2 (en) * 2010-11-29 2017-04-11 Biocatch Ltd. Device, system, and method of detecting hardware components
US10083439B2 (en) 2010-11-29 2018-09-25 Biocatch Ltd. Device, system, and method of differentiating over multiple accounts between legitimate user and cyber-attacker
US9450971B2 (en) * 2010-11-29 2016-09-20 Biocatch Ltd. Device, system, and method of visual login and stochastic cryptography
WO2013006071A1 (en) 2011-07-07 2013-01-10 Critical Software, S.A. System and method for intrusion detection through keystroke dynamics
US8689350B2 (en) 2011-09-24 2014-04-01 Elwha Llc Behavioral fingerprint controlled theft detection and recovery
US9083687B2 (en) 2011-09-24 2015-07-14 Elwha Llc Multi-device behavioral fingerprinting
US8713704B2 (en) 2011-09-24 2014-04-29 Elwha Llc Behavioral fingerprint based authentication
US9348985B2 (en) 2011-11-23 2016-05-24 Elwha Llc Behavioral fingerprint controlled automatic task determination
US8555077B2 (en) 2011-11-23 2013-10-08 Elwha Llc Determining device identity using a behavioral fingerprint
US9298900B2 (en) 2011-09-24 2016-03-29 Elwha Llc Behavioral fingerprinting via inferred personal relation
US9621404B2 (en) 2011-09-24 2017-04-11 Elwha Llc Behavioral fingerprinting with social networking
US9015860B2 (en) 2011-09-24 2015-04-21 Elwha Llc Behavioral fingerprinting via derived personal relation
US9825967B2 (en) 2011-09-24 2017-11-21 Elwha Llc Behavioral fingerprinting via social networking interaction
US9729549B2 (en) 2011-09-24 2017-08-08 Elwha Llc Behavioral fingerprinting with adaptive development
US8869241B2 (en) 2011-09-24 2014-10-21 Elwha Llc Network acquired behavioral fingerprint for authentication
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US10796232B2 (en) 2011-12-04 2020-10-06 Salesforce.Com, Inc. Explaining differences between predicted outcomes and actual outcomes of a process
US10802687B2 (en) 2011-12-04 2020-10-13 Salesforce.Com, Inc. Displaying differences between different data sets of a process
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
WO2013155628A1 (en) 2012-04-17 2013-10-24 Zighra Inc. Fraud detection system, method, and device
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9317810B2 (en) 2012-07-26 2016-04-19 The Boeing Company Intelligence analysis
EP2880619A1 (en) 2012-08-02 2015-06-10 The 41st Parameter, Inc. Systems and methods for accessing records via derivative locators
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
WO2014205148A1 (en) * 2013-06-19 2014-12-24 Arizona Board Of Regents For The University Of Arizona Continuous authentication tool
US10694987B1 (en) 2013-06-27 2020-06-30 Neurametrix, Inc. Neurological disorder determining and monitoring system and method
EP3019991B1 (en) * 2013-07-09 2019-02-20 BioCatch Ltd. Device, system, and method of differentiating among users of a computerized service
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US20150073998A1 (en) 2013-09-09 2015-03-12 Apple Inc. Use of a Biometric Image in Online Commerce
US9942396B2 (en) 2013-11-01 2018-04-10 Adobe Systems Incorporated Document distribution and interaction
US9444804B2 (en) 2013-11-25 2016-09-13 Roy S. Melzer Dynamic security question generation
US9817880B1 (en) * 2013-12-03 2017-11-14 Google Inc. Social-aware resource allocation for large-scale distributed systems
US9544149B2 (en) 2013-12-16 2017-01-10 Adobe Systems Incorporated Automatic E-signatures in response to conditions and/or events
CN103699822B (en) * 2013-12-31 2016-11-02 同济大学 User's anomaly detection method in ecommerce based on mouse behavior
US9747428B2 (en) 2014-01-30 2017-08-29 Qualcomm Incorporated Dynamic keyboard and touchscreen biometrics
US20150220931A1 (en) 2014-01-31 2015-08-06 Apple Inc. Use of a Biometric Image for Authorization
WO2015116905A1 (en) 2014-01-31 2015-08-06 Arizona Board Of Regents For The University Of Arizona Fraudulent application detection system and method of use
US20180113782A1 (en) * 2014-06-11 2018-04-26 Arizona Board Of Regents On Behalf Of The University Of Arizona Adaptive web analytic response environment
US9264419B1 (en) * 2014-06-26 2016-02-16 Amazon Technologies, Inc. Two factor authentication with authentication objects
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
WO2015196447A1 (en) 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10694947B2 (en) 2014-06-27 2020-06-30 Neurametrix, Inc. System and method for continuous monitoring of central nervous system diseases
EP3161701B1 (en) * 2014-06-27 2020-06-17 Microsoft Technology Licensing, LLC Data protection system based on user input patterns on device
US9639445B2 (en) 2014-10-09 2017-05-02 Insightete Corporation System and method for comprehensive performance and availability tracking using passive monitoring and intelligent synthetic activity generation for monitoring a system
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US9703982B2 (en) 2014-11-06 2017-07-11 Adobe Systems Incorporated Document distribution and interaction
US20160162900A1 (en) 2014-12-09 2016-06-09 Zighra Inc. Fraud detection system, method, and device
US10255358B2 (en) 2014-12-30 2019-04-09 Facebook, Inc. Systems and methods for clustering items associated with interactions
US9935777B2 (en) 2015-08-31 2018-04-03 Adobe Systems Incorporated Electronic signature framework with enhanced security
US9860227B2 (en) 2015-09-11 2018-01-02 Google Llc Identifying panelists based on input interaction patterns
US9626653B2 (en) 2015-09-21 2017-04-18 Adobe Systems Incorporated Document distribution and interaction with delegation of signature authority
US11100201B2 (en) 2015-10-21 2021-08-24 Neurametrix, Inc. Method and system for authenticating a user through typing cadence
US11079856B2 (en) 2015-10-21 2021-08-03 Neurametrix, Inc. System and method for authenticating a user through unique aspects of the user's keyboard
RU2626337C1 (en) 2016-02-18 2017-07-26 Акционерное общество "Лаборатория Касперского" Method of detecting fraudulent activity on user device
US10097541B2 (en) 2016-05-04 2018-10-09 Ca, Inc. Computer security based on mouse device speed setting authentication
US10347215B2 (en) 2016-05-27 2019-07-09 Adobe Inc. Multi-device electronic signature framework
RU2634211C1 (en) 2016-07-06 2017-10-24 Общество с ограниченной ответственностью "Траст" Method and system of protocols analysis of harmful programs interaction with control centers and detection of computer attacks
RU2649793C2 (en) 2016-08-03 2018-04-04 ООО "Группа АйБи" Method and system of detecting remote connection when working on web resource pages
US11301550B2 (en) * 2016-09-07 2022-04-12 Cylance Inc. Computer user authentication using machine learning
RU2634209C1 (en) 2016-09-19 2017-10-24 Общество с ограниченной ответственностью "Группа АйБи ТДС" System and method of autogeneration of decision rules for intrusion detection systems with feedback
US10198122B2 (en) 2016-09-30 2019-02-05 Biocatch Ltd. System, device, and method of estimating force applied to a touch surface
RU2637477C1 (en) 2016-12-29 2017-12-04 Общество с ограниченной ответственностью "Траст" System and method for detecting phishing web pages
RU2671991C2 (en) 2016-12-29 2018-11-08 Общество с ограниченной ответственностью "Траст" System and method for collecting information for detecting phishing
US10579166B2 (en) * 2017-04-05 2020-03-03 Board Of Supervisors Of Louisiana State University And Agricultural And Mechanical College Pointer acceleration system modeling
US10503919B2 (en) 2017-04-10 2019-12-10 Adobe Inc. Electronic signature framework with keystroke biometric authentication
US11315010B2 (en) 2017-04-17 2022-04-26 Splunk Inc. Neural networks for detecting fraud based on user behavior biometrics
US11372956B2 (en) 2017-04-17 2022-06-28 Splunk Inc. Multiple input neural networks for detecting fraud
US11102225B2 (en) 2017-04-17 2021-08-24 Splunk Inc. Detecting fraud by correlating user behavior biometrics with other data sources
US10999297B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Using expected behavior of an entity when prepopulating an adaptive trust profile
US10943019B2 (en) 2017-05-15 2021-03-09 Forcepoint, LLC Adaptive trust profile endpoint
US9882918B1 (en) 2017-05-15 2018-01-30 Forcepoint, LLC User behavior profile in a blockchain
US10917423B2 (en) 2017-05-15 2021-02-09 Forcepoint, LLC Intelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10862927B2 (en) 2017-05-15 2020-12-08 Forcepoint, LLC Dividing events into sessions during adaptive trust profile operations
US10129269B1 (en) 2017-05-15 2018-11-13 Forcepoint, LLC Managing blockchain access to user profile information
US10318729B2 (en) 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
RU2689816C2 (en) 2017-11-21 2019-05-29 ООО "Группа АйБи" Method for classifying sequence of user actions (embodiments)
RU2677368C1 (en) 2018-01-17 2019-01-16 Общество С Ограниченной Ответственностью "Группа Айби" Method and system for automatic determination of fuzzy duplicates of video content
RU2680736C1 (en) 2018-01-17 2019-02-26 Общество с ограниченной ответственностью "Группа АйБи ТДС" Malware files in network traffic detection server and method
RU2677361C1 (en) 2018-01-17 2019-01-16 Общество с ограниченной ответственностью "Траст" Method and system of decentralized identification of malware programs
RU2668710C1 (en) 2018-01-17 2018-10-02 Общество с ограниченной ответственностью "Группа АйБи ТДС" Computing device and method for detecting malicious domain names in network traffic
RU2676247C1 (en) 2018-01-17 2018-12-26 Общество С Ограниченной Ответственностью "Группа Айби" Web resources clustering method and computer device
RU2681699C1 (en) 2018-02-13 2019-03-12 Общество с ограниченной ответственностью "Траст" Method and server for searching related network resources
US11156020B2 (en) * 2018-05-29 2021-10-26 Spectrum Brands, Inc. Tamper alarm for electronic lock
WO2020027773A1 (en) * 2018-07-30 2020-02-06 Hewlett-Packard Development Company, L.P. User interface modification
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
RU2708508C1 (en) 2018-12-17 2019-12-09 Общество с ограниченной ответственностью "Траст" Method and a computing device for detecting suspicious users in messaging systems
RU2701040C1 (en) 2018-12-28 2019-09-24 Общество с ограниченной ответственностью "Траст" Method and a computer for informing on malicious web resources
US11151232B2 (en) * 2019-01-28 2021-10-19 EMC IP Holding Company LLC User authentication by endpoint device using local policy engine and endpoint data
EP3842968A4 (en) 2019-02-27 2022-03-16 "Group IB" Ltd. Method and system for identifying a user according to keystroke dynamics
US10853496B2 (en) 2019-04-26 2020-12-01 Forcepoint, LLC Adaptive trust profile behavioral fingerprint
RU2728497C1 (en) 2019-12-05 2020-07-29 Общество с ограниченной ответственностью "Группа АйБи ТДС" Method and system for determining belonging of software by its machine code
RU2728498C1 (en) 2019-12-05 2020-07-29 Общество с ограниченной ответственностью "Группа АйБи ТДС" Method and system for determining software belonging by its source code
RU2743974C1 (en) 2019-12-19 2021-03-01 Общество с ограниченной ответственностью "Группа АйБи ТДС" System and method for scanning security of elements of network architecture
SG10202001963TA (en) 2020-03-04 2021-10-28 Group Ib Global Private Ltd System and method for brand protection based on the search results
US11475090B2 (en) 2020-07-15 2022-10-18 Group-Ib Global Private Limited Method and system for identifying clusters of affiliated web resources
RU2743619C1 (en) 2020-08-06 2021-02-20 Общество с ограниченной ответственностью "Группа АйБи ТДС" Method and system for generating the list of compromise indicators
US11630886B2 (en) * 2020-09-17 2023-04-18 International Business Machines Corporation Computer security forensics based on temporal typing changes of authentication credentials
US11907350B2 (en) 2020-09-30 2024-02-20 Mastercard Technologies Canada ULC User identification with blended response from dual-layer identification service
AU2021354156A1 (en) * 2020-09-30 2023-05-04 Mastercard Technologies Canada ULC User identification with input profile record
US11947572B2 (en) 2021-03-29 2024-04-02 Group IB TDS, Ltd Method and system for clustering executable files
US20230315216A1 (en) * 2022-03-31 2023-10-05 Rensselaer Polytechnic Institute Digital penmanship

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040095384A1 (en) * 2001-12-04 2004-05-20 Applied Neural Computing Ltd. System for and method of web signature recognition system based on object map

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5229764A (en) * 1991-06-20 1993-07-20 Matchett Noel D Continuous biometric authentication matrix
US5596718A (en) * 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
US5557686A (en) * 1993-01-13 1996-09-17 University Of Alabama Method and apparatus for verification of a computer user's identification, based on keystroke characteristics
JPH07303209A (en) * 1994-05-06 1995-11-14 Matsushita Electric Ind Co Ltd Special effect editing device
JPH0855021A (en) * 1994-08-10 1996-02-27 Fujitsu Ltd Key authentication system
US6943845B2 (en) * 2000-12-15 2005-09-13 Canon Kabushiki Kaisha Apparatus and method for data processing, and storage medium
JP2002222051A (en) * 2001-01-29 2002-08-09 Tookado:Kk Index slight movement structure of mouse
US7350078B1 (en) * 2001-04-26 2008-03-25 Gary Odom User selection of computer login
US20050008148A1 (en) * 2003-04-02 2005-01-13 Dov Jacobson Mouse performance identification
US20040221171A1 (en) 2003-05-02 2004-11-04 Ahmed Ahmed Awad E. Intrusion detector based on mouse dynamics analysis

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040095384A1 (en) * 2001-12-04 2004-05-20 Applied Neural Computing Ltd. System for and method of web signature recognition system based on object map

Cited By (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050008148A1 (en) * 2003-04-02 2005-01-13 Dov Jacobson Mouse performance identification
US20060224898A1 (en) * 2003-05-02 2006-10-05 Ahmed Ahmed E System and method for determining a computer user profile from a motion-based input device
US8230232B2 (en) 2003-05-02 2012-07-24 Uvic Industry Partnerships Inc. System and method for determining a computer user profile from a motion-based input device
US7562389B1 (en) 2004-07-30 2009-07-14 Cisco Technology, Inc. Method and system for network security
US20060023709A1 (en) * 2004-08-02 2006-02-02 Hall Michael L Inline intrusion detection using a single physical port
US7555774B2 (en) 2004-08-02 2009-06-30 Cisco Technology, Inc. Inline intrusion detection using a single physical port
US20060161983A1 (en) * 2005-01-20 2006-07-20 Cothrell Scott A Inline intrusion detection
US9009830B2 (en) 2005-01-20 2015-04-14 Cisco Technology, Inc. Inline intrusion detection
US7725938B2 (en) 2005-01-20 2010-05-25 Cisco Technology, Inc. Inline intrusion detection
US20100146622A1 (en) * 2006-10-04 2010-06-10 Nordstroem Peder Security system and method for detecting intrusion in a computerized system
EP2069993A4 (en) * 2006-10-04 2011-05-18 Behaviometrics Ab Security system and method for detecting intrusion in a computerized system
EP2069993A2 (en) * 2006-10-04 2009-06-17 Behaviometrics AB Security system and method for detecting intrusion in a computerized system
US8443443B2 (en) 2006-10-04 2013-05-14 Behaviometrics Ab Security system and method for detecting intrusion in a computerized system
EP2382736A2 (en) * 2009-01-23 2011-11-02 Microsoft Corporation Passive security enforcement
US10389712B2 (en) 2009-01-23 2019-08-20 Microsoft Technology Licensing, Llc Passive security enforcement
US9641502B2 (en) 2009-01-23 2017-05-02 Microsoft Technology Licensing, Llc Passive security enforcement
US8898758B2 (en) 2009-01-23 2014-11-25 Microsoft Corporation Passive security enforcement
EP2382736A4 (en) * 2009-01-23 2014-06-18 Microsoft Corp Passive security enforcement
US10621585B2 (en) 2010-11-29 2020-04-14 Biocatch Ltd. Contextual mapping of web-pages, and generation of fraud-relatedness score-values
US11250435B2 (en) 2010-11-29 2022-02-15 Biocatch Ltd. Contextual mapping of web-pages, and generation of fraud-relatedness score-values
US11838118B2 (en) * 2010-11-29 2023-12-05 Biocatch Ltd. Device, system, and method of detecting vishing attacks
US11736478B2 (en) * 2010-11-29 2023-08-22 Biocatch Ltd. Device, system, and method of user authentication based on user-specific characteristics of task performance
US11580553B2 (en) 2010-11-29 2023-02-14 Biocatch Ltd. Method, device, and system of detecting mule accounts and accounts used for money laundering
US11425563B2 (en) 2010-11-29 2022-08-23 Biocatch Ltd. Method, device, and system of differentiating between a cyber-attacker and a legitimate user
US10262324B2 (en) 2010-11-29 2019-04-16 Biocatch Ltd. System, device, and method of differentiating among users based on user-specific page navigation sequence
US10298614B2 (en) * 2010-11-29 2019-05-21 Biocatch Ltd. System, device, and method of generating and managing behavioral biometric cookies
US11330012B2 (en) * 2010-11-29 2022-05-10 Biocatch Ltd. System, method, and device of authenticating a user based on selfie image or selfie video
US11314849B2 (en) 2010-11-29 2022-04-26 Biocatch Ltd. Method, device, and system of detecting a lie of a user who inputs data
US20220116389A1 (en) * 2010-11-29 2022-04-14 Biocatch Ltd. Device, system, and method of user authentication based on user-specific characteristics of task performance
US10404729B2 (en) 2010-11-29 2019-09-03 Biocatch Ltd. Device, method, and system of generating fraud-alerts for cyber-attacks
US10476873B2 (en) * 2010-11-29 2019-11-12 Biocatch Ltd. Device, system, and method of password-less user authentication and password-less detection of user identity
US10474815B2 (en) 2010-11-29 2019-11-12 Biocatch Ltd. System, device, and method of detecting malicious automatic script and code injection
US11269977B2 (en) 2010-11-29 2022-03-08 Biocatch Ltd. System, apparatus, and method of collecting and processing data in electronic devices
US11223619B2 (en) * 2010-11-29 2022-01-11 Biocatch Ltd. Device, system, and method of user authentication based on user-specific characteristics of task performance
US10586036B2 (en) 2010-11-29 2020-03-10 Biocatch Ltd. System, device, and method of recovery and resetting of user authentication factor
US11210674B2 (en) 2010-11-29 2021-12-28 Biocatch Ltd. Method, device, and system of detecting mule accounts and accounts used for money laundering
US20210329030A1 (en) * 2010-11-29 2021-10-21 Biocatch Ltd. Device, System, and Method of Detecting Vishing Attacks
US10949514B2 (en) 2010-11-29 2021-03-16 Biocatch Ltd. Device, system, and method of differentiating among users based on detection of hardware components
US10949757B2 (en) 2010-11-29 2021-03-16 Biocatch Ltd. System, device, and method of detecting user identity based on motor-control loop model
US10728761B2 (en) 2010-11-29 2020-07-28 Biocatch Ltd. Method, device, and system of detecting a lie of a user who inputs data
US10747305B2 (en) 2010-11-29 2020-08-18 Biocatch Ltd. Method, system, and device of authenticating identity of a user of an electronic device
US10917431B2 (en) 2010-11-29 2021-02-09 Biocatch Ltd. System, method, and device of authenticating a user based on selfie image or selfie video
US10897482B2 (en) 2010-11-29 2021-01-19 Biocatch Ltd. Method, device, and system of back-coloring, forward-coloring, and fraud detection
US10776476B2 (en) 2010-11-29 2020-09-15 Biocatch Ltd. System, device, and method of visual login
US10834590B2 (en) 2010-11-29 2020-11-10 Biocatch Ltd. Method, device, and system of differentiating between a cyber-attacker and a legitimate user
EP2584488A1 (en) 2011-09-20 2013-04-24 Kaspersky Lab Zao System and method for detecting computer security threats based on verdicts of computer users
US8214905B1 (en) 2011-12-21 2012-07-03 Kaspersky Lab Zao System and method for dynamically allocating computing resources for processing security information
US8214904B1 (en) 2011-12-21 2012-07-03 Kaspersky Lab Zao System and method for detecting computer security threats based on verdicts of computer users
US8209758B1 (en) 2011-12-21 2012-06-26 Kaspersky Lab Zao System and method for classifying users of antivirus software based on their level of expertise in the field of computer security
CN104252595A (en) * 2013-06-28 2014-12-31 贝壳网际(北京)安全技术有限公司 Application program analysis method and device and client
US20150178374A1 (en) * 2013-12-23 2015-06-25 Trusteer Ltd. Method and system of providing user profile detection from an input device
US10719765B2 (en) 2015-06-25 2020-07-21 Biocatch Ltd. Conditional behavioral biometrics
US11238349B2 (en) 2015-06-25 2022-02-01 Biocatch Ltd. Conditional behavioural biometrics
US11323451B2 (en) 2015-07-09 2022-05-03 Biocatch Ltd. System, device, and method for detection of proxy server
US10834090B2 (en) * 2015-07-09 2020-11-10 Biocatch Ltd. System, device, and method for detection of proxy server
US10523680B2 (en) * 2015-07-09 2019-12-31 Biocatch Ltd. System, device, and method for detecting a proxy server
US11055395B2 (en) 2016-07-08 2021-07-06 Biocatch Ltd. Step-up authentication
US10579784B2 (en) 2016-11-02 2020-03-03 Biocatch Ltd. System, device, and method of secure utilization of fingerprints for user authentication
US10685355B2 (en) 2016-12-04 2020-06-16 Biocatch Ltd. Method, device, and system of detecting mule accounts and accounts used for money laundering
US10666636B2 (en) 2017-01-04 2020-05-26 International Business Machines Corporation Controlling access to electronic services based on a user's sociometric identification document
US10333917B2 (en) 2017-01-04 2019-06-25 International Business Machines Corporation Controlling access to electronic resources based on a user's sociometric identification document
US10397262B2 (en) 2017-07-20 2019-08-27 Biocatch Ltd. Device, system, and method of detecting overlay malware
US10970394B2 (en) 2017-11-21 2021-04-06 Biocatch Ltd. System, device, and method of detecting vishing attacks
CN108460269A (en) * 2018-03-21 2018-08-28 广州多益网络股份有限公司 Verification method and device, verification terminal device
US11410187B2 (en) 2019-03-01 2022-08-09 Mastercard Technologies Canada ULC Feature drift hardened online application origination (OAO) service for fraud prevention systems
US20200279266A1 (en) * 2019-03-01 2020-09-03 Mastercard Technologies Canada ULC Multi-page online application origination (oao) service for fraud prevention systems
WO2020176977A1 (en) * 2019-03-01 2020-09-10 Mastercard Technologies Canada ULC Multi-page online application origination (oao) service for fraud prevention systems
US11928683B2 (en) 2019-10-01 2024-03-12 Mastercard Technologies Canada ULC Feature encoding in online application origination (OAO) service for a fraud prevention system
US11606353B2 (en) 2021-07-22 2023-03-14 Biocatch Ltd. System, device, and method of generating and utilizing one-time passwords

Also Published As

Publication number Publication date
US8230232B2 (en) 2012-07-24
WO2004097601A1 (en) 2004-11-11
US20060224898A1 (en) 2006-10-05
CA2535542A1 (en) 2004-11-11
CA2535542C (en) 2016-04-19

Similar Documents

Publication Publication Date Title
US20040221171A1 (en) Intrusion detector based on mouse dynamics analysis
Nickel et al. Classifying accelerometer data via hidden markov models to authenticate people by the way they walk
Garg et al. Profiling users in GUI based systems for masquerade detection
CN105139029B (en) A kind of Activity recognition method and device of prison prisoner
CN107145778B (en) Intrusion detection method and device
WO2009090584A2 (en) Method and system for activity recognition and its application in fall detection
Almalki et al. Continuous authentication using mouse clickstream data analysis
Shitharth et al. An enriched RPCO-BCNN mechanisms for attack detection and classification in SCADA systems
CN111625792B (en) Identity recognition method based on abnormal behavior detection
Deutschmann et al. Behavioral biometrics for DARPA's active authentication program
Dholi et al. Typing pattern recognition using keystroke dynamics
CN115438102A (en) Space-time data anomaly identification method and device and electronic equipment
KR101329100B1 (en) Apparatus for contest awareness and method using the same
Shen et al. A hypo-optimum feature selection strategy for mouse dynamics in continuous identity authentication and monitoring
Hemmer et al. Comparative assessment of process mining for supporting IoT predictive security
Yıldırım et al. Novel feature extraction methods for authentication via mouse dynamics with semi-supervised learning
US20050283511A1 (en) Cross-feature analysis
CN110943974B (en) DDoS (distributed denial of service) anomaly detection method and cloud platform host
Rahman et al. Identifying user authentication and most frequently used region based on mouse movement data: A machine learning approach
CN113438239B (en) Network attack detection method and device based on depth k nearest neighbor
Ahmed et al. Mouse dynamics biometric technology
Quraishi et al. Secure System of Continuous User Authentication Using Mouse Dynamics
Awad Collective framework for fraud detection using behavioral biometrics
WO2021151947A1 (en) Method to generate training data for a bot detector module, bot detector module trained from training data generated by the method and bot detection system
Changshui et al. AR model for keystroker verification

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION