Cyber Coercion Detection Using LLM-Assisted Multimodal Biometric System
Abstract
Featured Application
Abstract
1. Introduction
2. Related Work
2.1. The Role of Behavioral and Physiological Biometrics in Stress Detection as an Indication of Cyber Coercion
2.2. Coercion Detection
2.3. Large Language Models in Cybersecurity
2.4. Gaps in the Current Research
3. System Design and Methodology
3.1. System Architecture Overview
3.2. Implementation Details
- Fusion Weight and Threshold Calibration
- Statistical Significance Testing
Algorithm 1. Training And Calibration |
# Feature extraction and normalization Build synchronized, 60 s windows with 30 s overlap from D_norm (drop degenerate windows). Extract window-level features: Keystroke: dwell, flight (IKI) stats, error/backspace ratios, bursts, speed. Mouse: speed/accel stats, idle-time ratio, click freq, angle-change rate, tortuosity, hesitations. PPG/HR: HR mean, SDNN, RMSSD, pNN50, LF/HF (fallback to time-domain if quality low). Per-user z-score normalize features. # Train OC-SVM on normal behavior Grid-search ν ∈ {0.01, 0.05, 0.1}, γ ∈ {1/d, 0.1/d, 10/d} with 5-fold CV on normal windows only. Fit RBF OC-SVM → obtain anomaly score A ∈ ℝ; min-max scale A to [0, 1] on validation. # Fine-tune LLM on context/policy data Construct instruction-style pairs: (policy snippets + action/comm. traces) → {policy-consistent, coercion-indicative}. Fine-tune base model (DeepSeek-R1-Distill-Qwen-32B) with fixed hyperparameters. Define inference template returning {coercion: bool, score: 0–100}. # Calibrate fusion and threshold For validation windows: compute OC-SVM score A and LLM score L. Fuse F = w_A · A + w_L · (L/100), choose w_A,w_L by maximizing ROC-AUC. Pick T_alert using Youden’s J (or F1) on validation ROC/PR curves. Persist {θ_svm, φ, w_A,w_L, T_alert}. |
Algorithm 2. Online Detection |
Collect current 60 s window of keystroke, mouse, (optional) PPG/HR; synchronize with commands/logs/emails. Extract and normalize features as in Algorithm 1 (fallback gracefully if a modality is missing). A ← OC-SVM anomaly score in [0, 1] using θ_svm. L ← LLM coercion score ∈ [0, 100] from φ using the inference prompt with policy/context. F ← w_A · A + w_L · (L/100). If F ≥ T_alert: Trigger alert: record context, scores, and policy references; (optionally) require re-authentication. Else: Continue monitoring. Apply hysteresis: require k consecutive positive windows to reduce flicker (k configurable). |
3.2.1. Camera-Based PPG Robustness and Alternatives
3.2.2. Reproducibility and Open Materials
3.3. Data Collection and Simulation-Based Experimental Setup
3.3.1. Normal User Behavior Data Collection
Baseline Scenario Synthesis Parameters
3.3.2. Integration of Coercion-Indicative Signals from Validated Datasets
- Privacy and Ethical Considerations
3.3.3. Procedure for Integrating Coercion Signals
- Behavioral Signal Integration (Keystroke and Mouse Dynamics):
- 2.
- Physiological Signal Integration (Heart Rate):
- 3.
- Temporal and Contextual Alignment:
- 4.
- Data Labeling:
- 5.
- Data Integration Justification
- 6.
- LLM Prompt Design
- 7.
- Policies and procedures
- User Account Management Policy:
- b.
- Data Access and Authorization Policy:
- c.
- Incident Response Policy:
3.4. Dataset Designed Scenarios for System Evaluation
4. Results and Discussions
4.1. Results
4.2. Limitations
5. Conclusions and Future Work
- Roadmap for Dataset Expansion and External Validation:
Supplementary Materials
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Verizon. 2023 Data Breach Investigations Report (DBIR). Available online: https://www.verizon.com/business/resources/reports/dbir (accessed on 28 May 2025).
- IBM Security. IBM Security X-Force Threat Intelligence Index 2023. IBM Corporation. Available online: https://www.ibm.com/security/data-breach/threat-intelligence (accessed on 28 May 2025).
- Alzaabi, F.R.; Mehmood, A. A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods. IEEE Access 2024, 12, 30907–30927. [Google Scholar] [CrossRef]
- Brown, T.; Mann, B.; Ryder, N.; Subbiah, M.; Kaplan, J.D.; Dhariwal, P.; Neelakantan, A.; Shyam, P.; Sastry, G.; Askell, A.; et al. Language Models are Few-Shot Learners. Adv. Neural Inf. Process. Syst. 2020, 33, 1877–1901. Available online: https://papers.nips.cc/paper/2020/file/1457c0d6bfcb4967418bfb8ac142f64a-Paper.pdf (accessed on 28 May 2025).
- Vizer, L.M.; Zhou, L.; Sears, A. Automated stress detection using keystroke and linguistic features: An exploratory study. Int. J. Hum.-Comput. Stud. 2009, 67, 870–886. [Google Scholar] [CrossRef]
- Hernandez, J.; Paredes, P.; Roseway, A.; Czerwinski, M. Under pressure: Sensing stress of computer users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ‘14), Toronto, ON, Canada, 26 April–1 May 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 51–60. [Google Scholar] [CrossRef]
- Sağbaş, E.A.; Korukoglu, S.; Balli, S. Stress Detection via Keyboard Typing Behaviors by Using Smartphone Sensors and Machine Learning Techniques. J. Med. Syst. 2020, 44, 4. [Google Scholar] [CrossRef] [PubMed]
- Asasfeh, A.; Alnawayseh, S.E.A.; AbdElkareem, R.; Salahat, M. Human Factors In Security Management: Understanding And Mitigating Insider Threats. In Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, 26–28 February 2024; pp. 1–10. [Google Scholar] [CrossRef]
- Ali, G.; Shaikh, N.A.; Shaikh, Z.A. Towards an automated multiagent system to monitor user activities against insider threat. In Proceedings of the 2008 International Symposium on Biometrics and Security Technologies, Isalambad, Pakistan, 23–28 April 2008; pp. 1–5. [Google Scholar] [CrossRef]
- Almomani, H.; Alsarhan, A.; AlJamal, M.; Aljaidi, M.; Alsarhan, T.; Khassawneh, B.; Samara, G.; Singla, M.K.; BaniMustafa, A. Proactive Insider Threat Detection Using Facial and Behavioral Biometrics. In Proceedings of the 2024 25th International Arab Conference on Information Technology (ACIT), Zarqa, Jordan, 10–12 December 2024; pp. 1–7. [Google Scholar] [CrossRef]
- Wang, X.; Shi, Y.; Zheng, K.; Zhang, Y.; Hong, W.; Cao, S. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. Sensors 2022, 22, 6627. [Google Scholar] [CrossRef] [PubMed]
- Sultanov, A.; Kogos, K. Insider threat detection based on stress recognition using keystroke dynamics. arXiv 2020, arXiv:2005.02862. Available online: https://arxiv.org/abs/2005.02862 (accessed on 20 May 2025).
- Lin, Y.; Ghose, D.; Korhonen, J.; You, J.; Dash, S.P. On the Explainable Detection of Stress Levels Using Heart Rate Variability Based Deep Neural Networks. In Proceedings of the 2023 IEEE International Conference on E-health Networking, Application & Services (Healthcom), Chongqing, China, 15–17 December 2023; pp. 333–335. [Google Scholar] [CrossRef]
- Lim, J.Z.; Mountstephens, J.; Teo, J. Emotion Recognition Using Eye-Tracking: Taxonomy, Review and Current Challenges. Sensors 2020, 20, 2384. [Google Scholar] [CrossRef] [PubMed] [PubMed Central]
- Arrabito, R.; Hou, M.; Fischmeister, S.; Falk, T.H.; Willoughby, H.; Cameron, M.; Foley, L.; Normandin, S.; Banbury, S. Tracking user trust and mental states during cyber-attacks: A survey of existing methods and future research directions on AI-enabled decision-making for the Royal Canadian Navy. In Proceedings of the 2024 IEEE 4th International Conference on Human-Machine Systems (ICHMS), Toronto, ON, Canada, 15–17 May 2024; pp. 1–4. [Google Scholar] [CrossRef]
- Matthew, P.; Anderson, M. Developing coercion detection solutions for biometric security. In 2016 SAI Computing Conference (SAI); IEEE: Piscataway, NJ, USA, 2016; pp. 1123–1130. [Google Scholar] [CrossRef]
- Hodgson, Q.E. Understanding and countering cyber coercion. In Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 30 May–1 June 2018; pp. 73–88. [Google Scholar] [CrossRef]
- Almehmadi, A. A Behavioral-Based Fingerprint Liveness and Willingness Detection System. Appl. Sci. 2022, 12, 11460. [Google Scholar] [CrossRef]
- Matthew, P.; Canning, S. An algorithmic approach for optimizing biometric systems using liveness and coercion detection. Comput. Secur. 2020, 94, 101831. [Google Scholar] [CrossRef]
- Maasaoui, Z.; Battou, A.; Merzouki, M.; Lbath, A. Anomaly Based Intrusion Detection using Large Language Models. In Proceedings of the The ACS/IEEE 21st International Conference on Computer Systems and Applications (AICCSA 2024), Sousse, Tunisia, 22–26 October 2024. [Google Scholar]
- Yao, Y.; Duan, J.; Xu, K.; Cai, Y.; Sun, Z.; Zhang, Y. A survey on large language model (LLM) security and privacy: The Good, The Bad, and The Ugly. High-Confid. Comput. 2024, 4, 100211. [Google Scholar] [CrossRef]
- Lee, R.J.; Sivakumar, S.; Lim, K.H. Review on remote heart rate measurements using photoplethysmography. Multimed. Tools Appl. 2024, 83, 44699–44728. [Google Scholar] [CrossRef]
- Ollama, DeepSeek-R1-Distill-Qwen-32B. Available online: https://ollama.com/library/deepseek-r1 (accessed on 14 May 2025).
- Koldijk, S.; Sappelli, M.; Verberne, S.; Neerincx, M.; Kraaij, W. The SWELL Knowledge Work Dataset for Stress and User Modeling Research. In Proceedings of the 16th ACM International Conference on Multimodal Interaction (ICMI 2014), Istanbul, Turkey, 12–16 November 2014. [Google Scholar]
- Schmidt, P.; Reiss, A.; Duerichen, R.; Marberger, C.; Van Laerhoven, K. Introducing WESAD, a multimodal dataset for Wearable Stress and Affect Detection. In Proceedings of the 20th ACM International Conference on Multimodal Interaction, Boulder, CO, USA, 16–20 October 2018. [Google Scholar]
- Pepa, L.; Sabatelli, A.; Ciabattoni, L.; Monteriù, A.; Lamberti, F.; Morra, L. Stress Detection in Computer Users From Keyboard and Mouse Dynamics. IEEE Trans. Consum. Electron. 2021, 67, 12–19. [Google Scholar] [CrossRef]
- Sudalaimuthu, T. Dynamic Cat-Boost Enabled Keystroke Analysis for User Stress Level Detection. In Proceedings of the 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), Greater Noida, India, 20–21 May 2022; pp. 556–560. [Google Scholar] [CrossRef]
- Mortensen, J.A.; Mollov, M.E.; Chatterjee, A.; Ghose, D.; Li, F.Y. Multi-Class Stress Detection Through Heart Rate Variability: A Deep Neural Network Based Study. IEEE Access 2023, 11, 57470–57480. [Google Scholar] [CrossRef]
- Heo, S.; Kwon, S.; Lee, J. Stress Detection With Single PPG Sensor by Orchestrating Multiple Denoising and Peak-Detecting Methods. IEEE Access 2021, 9, 47777–47785. [Google Scholar] [CrossRef]
- Liapis, A.; Faliagka, E.; Antonopoulos, C.P.; Keramidas, G.; Voros, N. Advancing Stress Detection Methodology with Deep Learning Techniques Targeting UX Evaluation in AAL Scenarios: Applying Embeddings for Categorical Variables. Electronics 2021, 10, 1550. [Google Scholar] [CrossRef]
- Androutsou, T.; Angelopoulos, S.; Hristoforou, E.; Matsopoulos, G.K.; Koutsouris, D.D. Automated Multimodal Stress Detection in Computer Office Workspace. Electronics 2023, 12, 2528. [Google Scholar] [CrossRef]
Reference | Method Used | Advantages | Limitations |
---|---|---|---|
Vizer et al. [5] (2009) | Keystroke and linguistic features for stress detection | Non-intrusive, no special hardware needed, cost-effective | Limited accuracy, linguistic context dependency |
Hernandez et al. [6] (2014) | Pressure-sensitive keyboard and capacitive mouse | High detection accuracy (79–75% sensitivity) | Specialized hardware required, not commonly available |
Sağbaş et al. [7] (2020) | Smartphone sensors (accelerometer and gyroscope) | High accuracy (~87.5%) using widely available mobile sensors | Limited applicability to desktop environments, requires mobile device use |
Asasfeh et al. [8] (2024) | Behavioral anomaly detection for insider threats | Comprehensive categorization, effective baseline deviation detection | No physiological integration, higher false positives |
Ali et al. [9] (2008) | Automated multi-agent behavioral monitoring system | Continuous monitoring capability, early threat detection | Potential user privacy concerns, increased complexity |
Almomani et al. [10] (2024) | Facial expression and behavioral biometrics | Effective proactive detection of insider threats | Requires facial recognition technology, privacy issues |
Arrabito et al. [13] (2024) | Heart rate variability (HRV) for stress detection | Reliable physiological biomarker for stress indication | Requires dedicated physiological sensors, intrusive setup |
Matthew & Anderson [16] (2016) | Biometric coercion detection methodologies | Early identification of coercive authentication | Difficulty distinguishing voluntary vs. involuntary biometric entries |
Almehmadi [18] (2022) | Fingerprint placement time analysis | Rapid, accurate differentiation of coerced authentication | Limited to fingerprint biometric context |
Matthew & Canning [19] (2020) | Liveness and coercion detection fusion algorithm | Robust dual protection against spoofing and coercion attacks | Complexity in fusion logic, potentially high false alarms |
Maasaoui et al. [20] (2024) | Large language models (LLM) using BERT-based transformer on network event streams (IoT traffic) | High semantic accuracy, near-perfect detection in IoT environments | Dependent on data quality, complex model tuning required |
Yao et al. [21] (2024) | LLM-based phishing email and malicious intent detection | Superior detection performance over human analysts | Potential bias from training data, high computational costs |
Test Number | Test Details | Objective | Notes |
---|---|---|---|
1 | Dataset without any integrated coercion indicators, representing normal user behavior with varying degrees of categories, updating user, deleting user, and deleting databases | Baseline with a slight difference in tasks such as updating user info, deleting user, and deleting database. | No integrated coercion signals |
2 | Dataset with coercion signals solely through integrated keystroke dynamics | Integrated coercion signals for keystroke dynamics only. | Unimodal: One behavior signal |
3 | Dataset with coercion signals solely through integrated mouse behaviors | Integrated coercion signals for mouse behaviors only. | Unimodal: One behavior signal |
4 | Dataset with coercion signals solely through elevated heart rate signals | Integrated coercion signals for heart rate signals only. | Unimodal: Physiological signal |
5 | Combined coercion signals via both keystroke dynamics and mouse behaviors | Integrated coercion signals for behavior measures (keystroke and mouse). | Multimodal: Two behavioral signals |
6 | Combined coercion signals via keystroke dynamics and elevated heart rate | Integrated coercion signals for behavior and physiological measures (keystroke and heart rate). | Multimodal: One Behavioral and one physiological signal |
7 | Combined coercion signals via mouse behaviors and elevated heart rate signals | Integrated coercion signals for behavior and physiological measures (mouse and heart rate). | Multimodal: One behavioral and one physiological signal |
8 | Comprehensive coercion signals through combined keystroke dynamics, mouse behaviors, and elevated heart rate signals | Integrated coercion signals for behavior and physiological measures (keystroke, mouse, and heart rate). | Multimodal: 2 behavioral and 1 physiological signals |
Scenario | LLM Confidence Level | |||||
---|---|---|---|---|---|---|
Update User | Delete User | Delete Database | ||||
No Email | With Email | No Email | With Email | No Email | With Email | |
Baseline | No | No | No | No | 72% | 100% |
Keystroke dynamics | 77% | 84% | 72% | 92% | 82% | 100% |
Mouse movement | 72% | 84% | 74% | 91% | 82% | 100% |
Heart rate | 85% | 92% | 86% | 94% | 88% | 100% |
Keystroke and Mouse | 80% | 93% | 79% | 93% | 96% | 100% |
Keystroke and Heart | 87% | 93% | 89% | 97% | 100% | 100% |
Mouse and heart | 90% | 93% | 92% | 97% | 100% | 100% |
Keystroke, mouse, and heart | 100% | 100% | 100% | 100% | 100% | 100% |
Scenario | Precision | Recall | F1-Score | ROC-AUC |
---|---|---|---|---|
Baseline (no coercion) | 0.91 | 0.90 | 0.90 | 0.95 |
Keystroke Dynamics | 0.88 | 0.92 | 0.90 | 0.94 |
Mouse Movement | 0.87 | 0.91 | 0.89 | 0.93 |
Heart Rate | 0.90 | 0.94 | 0.92 | 0.96 |
Keystroke + Mouse | 0.93 | 0.95 | 0.94 | 0.97 |
Keystroke + Heart | 0.95 | 0.97 | 0.96 | 0.98 |
Mouse + Heart | 0.95 | 0.97 | 0.96 | 0.98 |
Keystroke + Mouse + Heart | 1.00 | 1.00 | 1.00 | 1.00 |
Method/Source | Modality | Reported Performance | Our Result (ROC-AUC) |
---|---|---|---|
Pepa et al. (IEEE TCE, 2021) [26] | Keystroke, Mouse | 76% (keys), 63% (mouse) acc | 0.94 (keys), 0.93 (mouse) |
Bakkialakshmi & Sudalaimuthu (IEEE Conf., 2022) [27] | Keystroke | ~94% acc (binary stress) | 0.94 (keys) |
Mortensen et al. (IEEE Access, 2023) [28] | HRV (ECG) | ~99.9% acc (3-class stress) | 0.96 (heart) |
Heo et al. (IEEE Access, 2021) [29] | PPG (HR) | 96.5% acc, F1 = 93% | 0.96 (heart) |
Liapis et al. (ACM SAC, 2021) [30] | EDA, Temp | ~97% acc | – |
Androutsou et al. (Electronics, 2023) [31] | Keyboard/Mouse + HR/EDA | ~90% acc | – |
Proposed (This Work) Simulated Dataset | Multimodal + LLM Fusion | ROC-AUC = 1.00 | – |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almehmadi, A. Cyber Coercion Detection Using LLM-Assisted Multimodal Biometric System. Appl. Sci. 2025, 15, 10658. https://doi.org/10.3390/app151910658
Almehmadi A. Cyber Coercion Detection Using LLM-Assisted Multimodal Biometric System. Applied Sciences. 2025; 15(19):10658. https://doi.org/10.3390/app151910658
Chicago/Turabian StyleAlmehmadi, Abdulaziz. 2025. "Cyber Coercion Detection Using LLM-Assisted Multimodal Biometric System" Applied Sciences 15, no. 19: 10658. https://doi.org/10.3390/app151910658
APA StyleAlmehmadi, A. (2025). Cyber Coercion Detection Using LLM-Assisted Multimodal Biometric System. Applied Sciences, 15(19), 10658. https://doi.org/10.3390/app151910658