User Authentication Based on Mouse Dynamics Using an Efficient-Net Model
DOI:
https://doi.org/10.25195/ijci.v51i2.612Keywords:
Mouse dynamics, Behavioral biometrics, Efficient Net, User authentication, Deep learning, Transfer learning, CybersecurityAbstract
As digital threats become increasingly sophisticated, user authentication has become vitally important in cybersecurity. Traditional authentication methods such as passwords are under increasing assault from a range of attacks. Behavioral biometrics, such as mouse dynamics, have the potential to address these attacks in a way that is largely passive and continuous. In this paper, we present a new solution that rests on mouse dynamics behavior together with a lightweight deep learning model inspired by EfficientNet, specifically designed for Behavioral Assessment of Numerical Data (BAND). The SapiMouse dataset, consisting of mouse tracking data from 120 actual users, is harnessed. By applying preprocessing techniques such as Quantile Transformation and Min-Max Encoding, along with encoding, the raw data were prepared for model training. The modified EfficientNet model retains its computational efficiency while also being tailored to work with numerical input. Its structure uses compact convolutions along with compound scaling to capture time-series mouse data discriminative features, lowering the processing burden while maintaining accuracy. Moreover, to stabilize training and enhance generalization, dropout and batch normalization layers were added, ensuring robustness to overfitting, even when using data generated by a model. CGAN’s capacity for class sample synthesis was harnessed towards improving recognition of unused user profiles, resulting in a total of 240 unique classes (120 real + 120 synthetic). The model reached an accuracy of 99.24% for classification and a macro-averaged F1-score of 0.991 on the testing set. An inference time of only 0.2331 seconds per sample, alongside a cumulative training duration of 158.25 seconds, suggests real-time applicability. These findings support the promise of repurposing advanced deep learning models for behavioral biometrics, providing affordable, scalable, and efficient user verification for sensitive security contexts.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Iraqi Journal for Computers and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
IJCI applies the Creative Commons Attribution (CC BY) license to articles. The author of the submitted paper for publication by IJCI has the CC BY license. Under this Open Access license, the author gives an agreement to any author to reuse the article in whole or part for any purpose, even for commercial purposes. Anyone may copy, distribute, or reuse the content as long as the author and source are properly cited. This facility helps in re-use and ensures that journal content is available for the needs of research.
If the manuscript contains photos, images, figures, tables, audio files, videos, etc., that the author or the co-authors do not own, IJCI will require the author to provide the journal with proof that the owner of that content has given the author written permission to use it, and the owner has approved that the CC BY license being applied to content. IJCI provides a form that the author can use to ask for permission from the owner. If the author does not have owner permission, IJCI will ask the author to remove that content and/or replace it with other content that the author owns or has such permission to use.
Many authors assume that if they previously published a paper through another publisher, they have the right to reuse that content in their PLOS paper, but that is not necessarily the case – it depends on the license that covers the other paper. The author must ascertain the rights he/she has of a specific license (a license that enables the author to use the content). The author must obtain written permission from the publisher to use the content in the IJCI paper. The author should not include any content in her/his IJCI paper without having the right to use it, and always give proper attribution.
The accompanying submitted data should be stated with licensing policies, the policies should not be more restrictive than CC BY.
IJCI has the right to remove photos, captures, images, figures, tables, illustrations, audio, and video files, from a paper before or after publication, if these contents were included in the author's paper without permission from the owner of the content.







