Research Article
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
Table 5
Compare with previous works.
| Source | FAR | FRR | Data required | Authentication time |
| [28] | 2.46% | 2.46% | 2000 mouse actions | 1033 seconds | (click/move/drag/stay) |
| [35] | 1.30% | 1.30% | 20 mouse clicks | 37.73 minutes(click) or 3.03 minutes(click/move) | (click or click/move) |
| [36] | 8.74% | 7.69% | 32 mouse operations | 11.80 seconds | (click/move) | 4.69% | 4.46% | 160 mouse operations | 59.49 seconds | (click/move) | 3.33% | 2.12% | 320 mouse operations | 118.14 seconds | (click/move) |
| ours | 10.73% | 9.58% | 25 mouse actions | 1.768 seconds | (click/move/drag/stay/scroll) | 6.86% | 5.36% | 50 mouse actions | 3.536 seconds | (click/move/drag/stay/scroll) | 2.94% | 2.28% | 100 mouse actions | 7.072 seconds | (click/move/drag/stay/scroll) | 1.79% | 0.23% | 500 mouse actions | 35.358 seconds | (click/move/drag/stay/scroll) | 0.58% | 0.12% | 1000 mouse actions | 70.716 seconds | (click/move/drag/stay/scroll) |
|
|