Show simple item record

dc.contributor.authorClarke, Nathan
dc.contributor.authorFurnell, Steven
dc.contributor.authorLi, F
dc.date.accessioned2017-07-11T10:16:21Z
dc.date.accessioned2017-08-11T11:46:12Z
dc.date.available2017-07-11T10:16:21Z
dc.date.available2017-08-11T11:46:12Z
dc.date.issued2017-07-10
dc.identifier.issn0167-4048
dc.identifier.issn1872-6208
dc.identifier.urihttp://hdl.handle.net/10026.1/9795
dc.description.abstract

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, however, investigators are not actually interested in the IP address but rather the associated user (whose account might have been compromised). However, given the range of devices (e.g., laptop, mobile, and tablet) that a user might be using and the widespread use of DHCP, IP is not a reliable and consistent means of understanding the traffic from a user. This paper presents a novel approach to the identification of users from network traffic using only the meta-data of the traffic (i.e. rather than payload) and the creation of application-level user interactions, which are proven to provide a far richer discriminatory feature set to enable more reliable identity verification. A study involving data collected from 46 users over a two-month period generated over 112 GBs of meta-data traffic was undertaken to examine the novel user-interaction based feature extraction algorithm. On an individual application basis, the approach can achieve recognition rates of 90%, with some users experiencing recognition performance of 100%. The consequence of this recognition is an enormous reduction in the volume of traffic an investigator has to analyse, allowing them to focus upon a particular suspect or enabling them to disregard traffic and focus upon what is left.

dc.format.extent335-350
dc.languageen
dc.language.isoen
dc.publisherElsevier BV
dc.relation.replaceshttp://hdl.handle.net/10026.1/9604
dc.relation.replaces10026.1/9604
dc.subjectBiometrics
dc.subjectDigital forensics
dc.subjectNetwork forensics
dc.subjectNetwork metadata
dc.subjectTraffic analysis
dc.subjectUser identification
dc.titleA novel privacy preserving user identification approach for network traffic
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000413127000019&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.volume70
plymouth.publication-statusPublished online
plymouth.journalComputers and Security
dc.identifier.doi10.1016/j.cose.2017.06.012
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2017-06-26
dc.identifier.eissn1872-6208
dc.rights.embargoperiodNo embargo
rioxxterms.funderEngineering and Physical Sciences Research Council
rioxxterms.identifier.projectIdentifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape
rioxxterms.versionofrecord10.1016/j.cose.2017.06.012
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2017-07-10
rioxxterms.typeJournal Article/Review
plymouth.funderIdentifying and Modelling Victim, Business, Regulatory and Malware Behaviours in a Changing Cyberthreat Landscape::Engineering and Physical Sciences Research Council
plymouth.oa-locationhttp://www.sciencedirect.com/science/article/pii/S0167404817301384


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV