TY - JOUR
T1 - Insider Misuse Identification using Transparent Biometrics
AU - Clarke, N
AU - Li, F
AU - Alruban, A
AU - Furnell, S
PY - 2017
Y1 - 2017
N2 - Insider misuse is a key threat to organizations.
Recent research has focused upon the information
itself – either through its protection or approaches to
detect the leakage. This paper seeks a different
approach through the application of transparent
biometrics to provide a robust approach to the
identification of the individuals who are misusing
systems and information. Transparent biometrics are a
suite of modalities, typically behavioral-based that can
capture biometric signals covertly or non-intrusively –
so the user is unaware of their capture. Transparent
biometrics are utilized in two phases a) to imprint
digital objects with biometric-signatures of the user
who last interacted with the object and b) uniquely
applied to network traffic in order to identify users
traffic (independent of the Internet Protocol address)
so that users rather than machine (IP) traffic can be
more usefully analyzed by analysts. Results from two
experimental studies are presented and illustrate how
reliably transparent biometrics are in providing this
link-ability of information to identity.
AB - Insider misuse is a key threat to organizations.
Recent research has focused upon the information
itself – either through its protection or approaches to
detect the leakage. This paper seeks a different
approach through the application of transparent
biometrics to provide a robust approach to the
identification of the individuals who are misusing
systems and information. Transparent biometrics are a
suite of modalities, typically behavioral-based that can
capture biometric signals covertly or non-intrusively –
so the user is unaware of their capture. Transparent
biometrics are utilized in two phases a) to imprint
digital objects with biometric-signatures of the user
who last interacted with the object and b) uniquely
applied to network traffic in order to identify users
traffic (independent of the Internet Protocol address)
so that users rather than machine (IP) traffic can be
more usefully analyzed by analysts. Results from two
experimental studies are presented and illustrate how
reliably transparent biometrics are in providing this
link-ability of information to identity.
UR - https://pearl.plymouth.ac.uk/context/secam-research/article/1958/viewcontent/paper0498.pdf
U2 - 10.24251/hicss.2017.487
DO - 10.24251/hicss.2017.487
M3 - Conference proceedings published in a journal
SN - 2572-6862
VL - 0
JO - Proceedings of the 50th Hawaii International Conference on System Sciences (2017)
JF - Proceedings of the 50th Hawaii International Conference on System Sciences (2017)
IS - 0
T2 - Hawaii International Conference on System Sciences
Y2 - 1 January 2017
ER -