Show simple item record

dc.contributor.authorAlotibi, G
dc.contributor.authorClarke, Nathan
dc.contributor.authorLi, F
dc.contributor.authorFurnell, S
dc.date.accessioned2022-04-25T11:03:26Z
dc.date.available2022-04-25T11:03:26Z
dc.date.issued2016-12
dc.identifier.issn2046-3359
dc.identifier.issn2046-3359
dc.identifier.urihttp://hdl.handle.net/10026.1/19065
dc.description.abstract

Insider misuse is become a major threat to many organisations. This is due to the knowledge that might have about the organization's security infrastructure. Therefore, a wide range of technologies have been developed to detect/prevent the insider misuse. Beyond detecting, there is a need to investigate the misuse and identify the individual perpetrating the crime. From a networking perspective, the investigations currently rely upon analysing traffic based upon two approaches: packet-based-approach and flow-based approach. However, a serious limitation in these approaches is the use of IPs addresses to link the misuse to the individual. However, IPs addresses are often not reliable because of the mobile-nature of use (i.e. mobile devices are continually connecting and disconnecting to networks resulting in a device being given a multitude of different IP addresses over time). The presence of DCHP only serves to complicate this for wired environments. This makes it challenging to identify the individual or individuals responsible for the misuse. This paper aims to propose a novel approach that is able to identify using encrypted network traffic. A novel feature extraction process is proposed, that is based upon deriving user actions from network-based applications using packet metadata only. This information is subsequently used to develop biometric-based behavioural profiles. An experiment using 27 participants and 2 months worth of network data is undertaken and shows that users are identifiable with individual applications resulting in recognitions rates of up to 100%.

dc.format.extent103-112
dc.language.isoen
dc.publisherInfonomics Society
dc.titleIdentifying Users by Network Traffic Metadata
dc.typejournal-article
plymouth.issue2
plymouth.volume4
plymouth.publication-statusPublished online
plymouth.journalInternational Journal of Chaotic Computing
dc.identifier.doi10.20533/ijcc.2046.3359.2016.0013
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2016-01-01
dc.rights.embargodate2022-4-26
dc.identifier.eissn2046-3359
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.20533/ijcc.2046.3359.2016.0013
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV