Research Article

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning

Table 5

Compare with previous works.

SourceFARFRRData requiredAuthentication time

‎[28]2.46%2.46%2000 mouse actions1033 seconds
(click/move/drag/stay)

‎[35]1.30%1.30%20 mouse clicks37.73 minutes(click) or 3.03 minutes(click/move)
(click or click/move)

‎[36]8.74%7.69%32 mouse operations11.80 seconds
(click/move)
4.69%4.46%160 mouse operations59.49 seconds
(click/move)
3.33%2.12%320 mouse operations118.14 seconds
(click/move)

ours10.73%9.58%25 mouse actions1.768 seconds
(click/move/drag/stay/scroll)
6.86%5.36%50 mouse actions3.536 seconds
(click/move/drag/stay/scroll)
2.94%2.28%100 mouse actions7.072 seconds
(click/move/drag/stay/scroll)
1.79%0.23%500 mouse actions35.358 seconds
(click/move/drag/stay/scroll)
0.58%0.12%1000 mouse actions70.716 seconds
(click/move/drag/stay/scroll)