Identification of trusted interactive behavior based on mouse behavior considering web User's emotions

Abstract Under existing network security technology, it is still possible for hackers to impersonate legitimate users and invade a system for malicious destruction. Therefore, this study constructs a user's unique mouse behavior pattern to identify a trusted interaction behavior in a real environment and quantify the effects of different emotions on mouse behavior and the accuracy of the user's trusted interaction behavior identification. First, mouse data was collected for 8 user's trusted interactions on an academic study website (AML). These data were used to construct the basic trusted interaction model by a big data analysis method called a random forest. Second, in a repeated measurement experiment, 18 participants completed tasks on the AML under different emotions, and the emotions' impact on the mouse behavior and accuracy of the user's trusted interaction identification was analyzed. In the results, the accuracy of the trusted interaction behavior identification based on mouse behavior reached 91.82%, and the error rate was lower than 8.18%. Significant differences were observed in horizontal velocity, velocity, and traveled distance under different emotions. However, there was no significant difference in the accuracy of a user's trusted interaction behavior identification under different emotions. Based on these results, the trusted interaction behavior of web users can be accurately identified based on the user's mouse behavior pattern. The user's mouse behavior differs under different emotions, but there is no significant difference on the identification of the user's trusted interaction behavior. The findings help to provide another protection layer for network information security.

[1]  K. Vohs,et al.  How Emotion Shapes Behavior: Feedback, Anticipation, and Reflection, Rather Than Direct Causation , 2007, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[2]  Karl H.E. Kroemer,et al.  Wrist Posture during Computer Mouse Usage , 1995 .

[3]  Stephanie M. Merritt Affective Processes in Human–Automation Interactions , 2011, Hum. Factors.

[4]  Daniel Capaldo Amaral,et al.  Automatic digital mood boards to connect users and designers with kansei engineering , 2019, International Journal of Industrial Ergonomics.

[5]  David Zhang,et al.  Optimal subset-division based discrimination and its kernelization for face and palmprint recognition , 2012, Pattern Recognit..

[6]  Malek Ben Salem,et al.  Active authentication using file system decoys and user behavior modeling: results of a large scale study , 2019, Comput. Secur..

[7]  D. Rempel,et al.  Effects of computer mouse design and task on carpal tunnel pressure. , 1999, Ergonomics.

[8]  Zhang Huanguo,et al.  Development of trusted computing research , 2008, Wuhan University Journal of Natural Sciences.

[9]  Mike Thelwall,et al.  Negative emotions boost user activity at BBC forum , 2010, 1011.5459.

[10]  S. Sutton Predicting and Explaining Intentions and Behavior: How Well Are We Doing? , 1998 .

[11]  A.K. Jain,et al.  Webbiometrics: User Verification Via Web Interaction , 2007, 2007 Biometrics Symposium.

[12]  Merlin Teodosia Suarez,et al.  Recognizing Student Emotions using Brainwaves and Mouse Behavior Data , 2013, Int. J. Distance Educ. Technol..

[13]  Ajit Varki,et al.  Human uniqueness: genome interactions with environment, behaviour and culture , 2008, Nature Reviews Genetics.

[14]  Baoyi Wang,et al.  A privacy protection scheme for smart meter that can verify terminal’s trustworthiness , 2019, International Journal of Electrical Power & Energy Systems.

[15]  Rosemary R. Seva,et al.  The influence of cellular phone attributes on users' affective experiences: a cultural comparison. , 2009 .

[16]  Rakesh Pandey,et al.  Assessing emotional processing difficulties in normotensive individuals with high and isolated blood pressure elevations , 2019, International journal of psychology : Journal international de psychologie.

[17]  Michael Franz,et al.  Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .

[18]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[19]  Russell Beale,et al.  Affect and Emotion in Human-Computer Interaction, From Theory to Applications , 2008, Affect and Emotion in Human-Computer Interaction.

[20]  Jonathan Klein,et al.  Frustrating the user on purpose: a step toward building an affective computer , 2002, Interact. Comput..

[21]  Russell Beale,et al.  The Role of Affect and Emotion in HCI , 2008, Affect and Emotion in Human-Computer Interaction.

[22]  Robert Sabourin,et al.  An adaptive classification system for video-based face recognition , 2012, Inf. Sci..

[23]  J. G. Taylor,et al.  Emotion recognition in human-computer interaction , 2005, Neural Networks.

[24]  André Ogliari,et al.  Stimulating design team creativity based on emotional values: A study on idea generation in the early stages of new product development processes , 2019, International Journal of Industrial Ergonomics.

[25]  S. Tomkins,et al.  Affect Imagery Consciousness: The Positive Affects , 1963 .

[26]  Biao Wang,et al.  Measuring Network User Trust via Mouse Behavior Characteristics Under Different Emotions , 2019, HCI.

[27]  Patrick Bours,et al.  A Login System Using Mouse Dynamics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[28]  H. N. Wieman The Unique in Human Behavior. , 1922 .

[29]  M. den Uyl,et al.  The FaceReader: Online facial expression recognition , 2006 .

[30]  George N. Votsis,et al.  Emotion recognition in human-computer interaction , 2001, IEEE Signal Process. Mag..

[31]  Robin L. Wakefield,et al.  Social media network behavior: A study of user passion and affect , 2016, J. Strateg. Inf. Syst..

[32]  P. Zimmermann,et al.  Affective Computing—A Rationale for Measuring Mood With Mouse and Keyboard , 2003, International journal of occupational safety and ergonomics : JOSE.

[33]  Leon Straker,et al.  Mouse versus keyboard use: A comparison of shoulder muscle load , 1998 .

[34]  Peter J. Lang,et al.  Gaze Patterns When Looking at Emotional Pictures: Motivationally Biased Attention , 2004 .

[35]  M. Bradley,et al.  Measuring emotion: Behavior, feeling, and physiology , 2000 .

[36]  Jiankun Hu,et al.  Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  Tom Fawcett,et al.  Data Science and its Relationship to Big Data and Data-Driven Decision Making , 2013, Big Data.

[38]  C. Darwin,et al.  The Expression of the Emotions in Man and Animals , 1872 .

[39]  M Hagberg,et al.  Differences between work methods and gender in computer mouse use. , 2000, Scandinavian journal of work, environment & health.

[40]  Thierry Pun,et al.  Multimodal Emotion Recognition in Response to Videos , 2012, IEEE Transactions on Affective Computing.

[41]  Johannes Götzfried,et al.  Hardware-Based Trusted Computing Architectures for Isolation and Attestation , 2018, IEEE Transactions on Computers.

[42]  Wolfgang Maehr eMotion: Estimation of User's Emotional State by Mouse Motions , 2008 .

[43]  L. Mises,et al.  Human Action: A Treatise on Economics , 1949 .

[44]  Sannyuya Liu,et al.  Temporal emotion-aspect modeling for discovering what students are concerned about in online course forums , 2019, Interact. Learn. Environ..

[45]  Ana L. N. Fred,et al.  A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.

[46]  Giovanni Pezzulo,et al.  How do you hold your mouse? Tracking the compatibility effect between hand posture and stimulus size , 2015, Psychological research.

[47]  Dieter Gollmann,et al.  Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..

[48]  Steven B. Lipner,et al.  The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.

[49]  Will Tao,et al.  Trusted interaction approach for dynamic service selection using multi-criteria decision making technique , 2012, Knowl. Based Syst..

[50]  I. Ajzen The theory of planned behavior , 1991 .

[51]  Lior Rokach,et al.  User identity verification via mouse dynamics , 2012, Inf. Sci..

[52]  J. Gross,et al.  The tie that binds? Coherence among emotion experience, behavior, and physiology. , 2005, Emotion.

[53]  Peter W. McOwan,et al.  Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[54]  Katarzyna Harezlak,et al.  Fusion of eye movement and mouse dynamics for reliable behavioral biometrics , 2018, Pattern Analysis and Applications.

[55]  Mats Hagberg,et al.  Computer mouse use in two different hand positions: exposure, comfort, exertion and productivity. , 2003, Applied ergonomics.

[56]  Soumik Mondal,et al.  A computational approach to the continuous authentication biometric system , 2015, Inf. Sci..

[57]  Takashi Yamauchi,et al.  Mouse Trajectories and State Anxiety: Feature Selection with Random Forest , 2013, 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction.

[58]  FragopanagosN.,et al.  2005 Special Issue , 2005 .