Prediction of human error using eye movements patterns for unintentional insider threat detection

@article{Takabi2018PredictionOH,
  title={Prediction of human error using eye movements patterns for unintentional insider threat detection},
  author={Hassan Takabi and Yessir Hashem and Ram Dantu},
  journal={2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)},
  year={2018},
  pages={1-8}
}
  • H. Takabi, Yessir Hashem, R. Dantu
  • Published 2018
  • Computer Science
  • 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA)
Threats from the inside of an organization's perimeters are a significant problem since it is difficult to distinguish them from benign activities. Recent reports indicate that the accidental/unintentional incidents account for the majority ofall insider security incidents. Human error is a major factor in unintentional insider threat. In this paper, we propose a novel approach for unintentional insider threat (UIT) detection and mitigation based on eye movement patterns. We perform experiments… 

Figures and Tables from this paper

A Novel Approach for Detection Insider Attacker Using Body Language
TLDR
This paper proposes approach to obtain early indicator to insider attacker before doing the crime by using three of negative body language gestures which referred to feeling of insecure, ready for an attack, doubt and a lack of self-confidence.
Micro-Behavioral Accidental Click Detection System for Preventing Slip-Based Human Error
TLDR
A micro-behavioral accidental click detection system (ACDS) to prevent slip-based human error is proposed and the results reveal the statistical significance between the two cases of intentional vs. unintentional clicks using a smartphone.
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics
TLDR
A non-invasive method for detecting insider threat based on stress recognition using keystroke dynamics assuming that intruder experiences stress during making illegal actions, which affects the behavioral characteristics.
A Risk-Based Framework to Inform Prioritisation of Security Investment for Insider Threats
TLDR
A risk-based framework called Security-in-Depth (SiD) where residual risk is the metric that assists the security manager to make informed decisions on which security packages contribute more to the organisation’s security objectives is developed.

References

SHOWING 1-10 OF 26 REFERENCES
Insider Threat Detection Based on Users ’ Mouse Movements and Keystrokes Behavior
TLDR
The results suggest that users’ mouse movements and keystrokes behavior can reveal valuable knowledge about their malicious behavior and can be used as indicators in the insider threat monitoring and detection frameworks.
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
TLDR
The effectiveness of using eye movement biometrics as a novel defence against the "lunchtime attack" by an insider threat is evaluated and a set of features that can be extracted from human eye movements are proposed and analyzed their distinctiveness and robustness using a systematic experimental design.
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals
TLDR
The use of human bio-signals to detect the malicious activities and its applicability for insider threats detection are examined to show that human brain and heart signals can reveal valuable knowledge about the malicious behaviors and could be an effective solution for detecting insider threats.
A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats
TLDR
Human Electroencephalogram (EEG) signals and eye tracking data can reveal valuable knowledge about user's malicious intent and can be used as an effective indicator in designing real-time insider threats monitoring and detection frameworks.
Towards Insider Threat Detection Using Psychophysiological Signals
TLDR
The results show that the detection accuracy of the malicious activities is up to 90% and demonstrate that electroencephalography (EEG) can reveal valuable knowledge about the user behaviors and could be a very effective solution for detecting insider threats.
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings
TLDR
This study provides an initial foundation for building future mechanisms based on the studied real-time neural and eye gaze features, that can automatically infer a user's "alertness" state, and determine whether or not the user's response should be relied upon.
Human eye movements as a trait for biometrical identification
TLDR
The resulting identification rates exhibit the efficacy of the suggested scheme to adequately segregate people according to their eye movement traits, which is based on the multivariate Wald - Wolfowitz test.
Towards task-independent person authentication using eye movement signals
TLDR
This work uses short-term eye gaze direction to construct feature vectors which are modeled using Gaussian mixtures and suggests that there are personspecific features in the eye movements that can be modeled in a task-independent manner.
GANT: Gaze analysis technique for human identification
Evaluation of temporal stability of eye tracking algorithms using webcams
...
...