ORCID
- Clarke, Nathan: 0000-0002-3595-3800
Abstract
Insider misuse is become a major threat to many organisations. This is due to the knowledge that might have about the organization's security infrastructure. Therefore, a wide range of technologies have been developed to detect/prevent the insider misuse. Beyond detecting, there is a need to investigate the misuse and identify the individual perpetrating the crime. From a networking perspective, the investigations currently rely upon analysing traffic based upon two approaches: packet-based-approach and flow-based approach. However, a serious limitation in these approaches is the use of IPs addresses to link the misuse to the individual. However, IPs addresses are often not reliable because of the mobile-nature of use (i.e. mobile devices are continually connecting and disconnecting to networks resulting in a device being given a multitude of different IP addresses over time). The presence of DCHP only serves to complicate this for wired environments. This makes it challenging to identify the individual or individuals responsible for the misuse. This paper aims to propose a novel approach that is able to identify using encrypted network traffic. A novel feature extraction process is proposed, that is based upon deriving user actions from network-based applications using packet metadata only. This information is subsequently used to develop biometric-based behavioural profiles. An experiment using 27 participants and 2 months worth of network data is undertaken and shows that users are identifiable with individual applications resulting in recognitions rates of up to 100%.
DOI
10.20533/ijcc.2046.3359.2016.0013
Publication Date
2016-12-01
Publication Title
International Journal of Chaotic Computing
Volume
4
Issue
2
ISSN
2046-3359
Embargo Period
2022-04-26
Organisational Unit
School of Engineering, Computing and Mathematics
First Page
103
Last Page
112
Recommended Citation
Alotibi, G., Clarke, N., Li, F., & Furnell, S. (2016) 'Identifying Users by Network Traffic Metadata', International Journal of Chaotic Computing, 4(2), pp. 103-112. Available at: https://doi.org/10.20533/ijcc.2046.3359.2016.0013