Title | Prediction of human error using eye movements patterns for unintentional insider threat detection |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Takabi, H, Hashem, Y, Dantu, R |
Conference Name | 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA) |
Date Published | Jan |
Keywords | accidental/unintentional incidents, Companies, eye, eye glasses, eye movement patterns, eye movements patterns, Feature extraction, Gaze tracking, Glass, human error prediction, insider security incidents, pupil feature extraction, Security, security of data, subjective mental workload, Task analysis, UIT detection, unintentional insider threat detection, Visualization |
Abstract |
Threats from the inside of an organization's perimeters are a significant problem since it is difficult to distinguish them from benign activities. Recent reports indicate that the accidental/unintentional incidents account for the majority ofall insider security incidents. Human error is a major factor in unintentional insider threat. In this paper, we propose a novel approach for unintentional insider threat (UIT) detection and mitigation based on eye movement patterns. We perform experiments to capture unique characteristics of a user's eye movements as they perform several computer-based activities in different scenarios. The goal is to evaluate the effectiveness of using eye movement patterns in determining a user's subjective mental workload which is one of the main contributing factors to human error. We extract eye movement and pupil features which allow us to reliably achieve this goal. We evaluate our proposed approach using several classifiers and examine how different subsets of features affect the performance. The results show about 82% accuracy on average for users wearing eye glasses and an average accuracy of 84.5% for users without eye glasses. Our results demonstrate that users' eye movement patterns and pupil behaviors can reveal valuable clues about their subjective mental workload and could be used in developing effective tools for unintentional insider threat detection and mitigation in real-world environments. |
DOI | 10.1109/ISBA.2018.8311479 |