SHARE
Facebook X Pinterest WhatsApp

Analyzing Mouse Movement May Prevent Online Fraud

thumbnail
Analyzing Mouse Movement May Prevent Online Fraud

A proposed new system could complement existing security safeguards by analyzing mouse movement to identify a fraudster.

Written By
thumbnail
David Curry
David Curry
Nov 12, 2019

While online fraud prevention has come along leaps and bounds since the early days of the internet, hackers continue to find more sophisticated ways to break into people’s online accounts.

To add another layer of security, Pranay Dave, director of AI and data science at Teradata, has published a new system that analyzes mouse movement to identify a fraudster. In his view, this could act as a passive security feature, which the user would not have to interact with.

SEE ALSO: Smart Cities See Clear ROI, And Heightened Cyber-security Risks

In a blog post on Medium, Dave demonstrates how movement time, deviation, velocity, and screen distance metrics differ considerably between normal and fraud usage. In almost all instances, the unwanted user is more efficient, quicker, and doesn’t have as many outliers (sudden speedy movements).

The data comes courtesy of a whitepaper published by the Institution of Engineering and Technology, and authored by Margit Antal and Elöd Egyed-Zsigmond.

“Different ways of protection mechanism such as digital autogenerated passwords, fingerprint, or advanced techniques such as voice or facial recognition have been used [in the past],” said Dave. “Unfortunately, they are, on the one hand, intrusive and on the other hand they do not provide continuous protection.”

Dave sees mouse monitoring as a potential solution for enterprise customers, to work alongside fraud prevention solutions already in place. “The data such as distance, speed, angle combined with elementary physics knowledge can be used for creative feature engineering to develop predictive models to combat online fraud,” said Dave.

thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

AI Agents Need Keys to Your Kingdom
Securing Patient Intake: The Hidden Threats to Protected Health Information
Yaron Galant
Dec 9, 2025
AI That Plays by Your Rules: Why Enterprise MCP Integration Changes Everything
Tim Freestone
Dec 3, 2025
Addressing the Hidden Security Risks of AI Agents in Industrial Operations

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.