Show simple item record

dc.contributor.authorAlruban, A
dc.contributor.authorClarke, Nathan
dc.contributor.authorLi, F
dc.contributor.authorFurnell, S
dc.date.accessioned2023-10-11T13:08:03Z
dc.date.available2023-10-11T13:08:03Z
dc.date.issued2016-12-07
dc.identifier.issn2057-2182
dc.identifier.issn2633-495X
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21373
dc.description.abstract

Insider misuse has become a real threat to many enterprises in the last decade. A major source of such threats originates from those individuals who have inside knowledge about the organization’s resources. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence, which provides a basis for investigating incidents. A key barrier however is often being able to associate an individual to the stolen data—especially when stolen credentials and the Trojan defense are two commonly cited arguments. This paper proposes an approach that can more inextricably link the use of information (e.g. images, documents and emails) to the individual users who use and access them through the use of transparent biometric imprinting. The use of transparent biometrics enables the covert capture of a user’s biometric information—avoiding the potential for forgery. A series of experiments are presented to evaluate the capability of retrieving the biometric information through a variety of file modification attacks. The preliminary feasibility study has shown that it is possible to correlate an individual’s biometric information with a digital object (images) and still be able to recover the biometric signal even with significant file modification.

dc.format.extent130-151
dc.publisherCentre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC)
dc.titleLeveraging Biometrics for Insider Misuse Identification
dc.typejournal-article
plymouth.issue1
plymouth.volume1
plymouth.publication-statusPublished
plymouth.journalInternational Journal on Cyber Situational Awareness
dc.identifier.doi10.22619/ijcsa.2016.100107
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2016-01-01
dc.date.updated2023-10-11T13:08:02Z
dc.rights.embargodate2023-10-14
dc.identifier.eissn2633-495X
dc.rights.embargoperiodforever
rioxxterms.versionofrecord10.22619/ijcsa.2016.100107


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV