“…The idea of user recognition and identification by ex-ploitation of biometric patterns has long been known [1], [2]. More recent studies look at dynamics of certain actions performed by the user -be it an on-line game-play activity [3], which shows that the idle and active times in the game are representative of the user; a keystroke analysis [4], which provides an impressive 96% correctness rate at user differentiation; or user-mouse interaction dynamics [5], establishing a behavioral characteristic that can be used as an additional security feature. The second area of research uses passive network traffic monitoring techniques for performance analysis, application type/protocol identification, anomaly and intrusion detections.…”