Keystroke and Mouse Movement Profiling for Data Loss Prevention

نویسندگان

  • Jain-Shing Wu
  • Chih-Ta Lin
  • Yuh-Jye Lee
  • Song-Kong Chong
چکیده

Data leakage is a serious problem for many large organizations. In order to provide the user with information about confidential data, many prevalent data leakage prevention (DLP) solutions rely on scanning the content of the relevant files. This approach requires the capability to parse various file formats. However, risks of data breach persist for unsupported file formats. To address this issue, we propose in this paper an active behavior-based DLP model that hooks the keyboard and mouse application programming interfaces (APIs) to track and profile user behavior. This model has two major advantages: (1) it can help discover sensitive data without parsing file formats, and (2) a data creator can be identified according to his/her keystroke and mouse movement behavior. Since this model is based on profiling user behavior, it eliminates the risk of data leakage from unsupported file formats and can identify the creator of a file. The experiments showcase the effectiveness of the proposed model with data creator identification method yields an accuracy rate of 92.64%, which is promising considering that the features of keystroke and mouse movement behavior are dealing together.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security: DArPA

I dentity verification for access control presents a trade-off between maximizing the probability of intruder detection and minimizing the cost for the legitimate user in terms of distractions and hardware requirements. In recent years, researchers have extensively explored behavioral biometric systems to address this challenge. 1 These systems rely on input devices, such as the keyboard and mo...

متن کامل

Cinnamaldehyde attenuates dopaminergic neuronal loss in substantia nigra and induces midbrain catalase activity in a mouse model of Parkinson’s disease

Background and Objective: Parkinson's disease (PD) is the second most common neurodegenerative disease after Alzheimer's disease that affects 3% of the population. PD involves a progressive degeneration of dopaminergic neurons in the substantia nigra pars compacta (SNc) and subsequent loss of dopamine. Dopamine depletion leads to movement dysfunction and is accompanied with tremor, rigid muscle...

متن کامل

Blog or block: Detecting blog bots through behavioral biometrics

1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.10.005 ⇑ Corresponding author. Tel.: +1 917 698 5015. E-mail addresses: [email protected] (Z. Chu (S. Gianvecchio), [email protected] (A. Koeh (H. Wang), [email protected] (S. Jajodia). Blog bots are automated scripts or programs that post comments to blog sites, often including spam or other malicious links. An e...

متن کامل

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics

Mouse dynamics is a form of behavioral biometrics that can be used for several security applications. Similar to keystroke dynamics, mouse dynamics does not required special hardware device for data collection. We target biometric identification problem by focusing on extracting the behavioral features related to the user and using this features for computer security. Standardized mouse dynamic...

متن کامل

From Character to Word Level: Enabling the Linguistic Analyses of Inputlog Process Data

Keystroke-logging tools are widely used in writing process research. These applications are designed to capture each character and mouse movement as isolated events as an indicator of cognitive processes. The current research project explores the possibilities of aggregating the logged process data from the letter level (keystroke) to the word level by merging them with existing lexica and usin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2015