首页> 外文期刊>Computers & Security >A novel privacy preserving user identification approach for network traffic
【24h】

A novel privacy preserving user identification approach for network traffic

机译:一种用于网络流量的新型隐私保护用户识别方法

获取原文
获取原文并翻译 | 示例
       

摘要

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address - as this is the only characteristic available. More typically, however, investigators are not actually interested in the IP address but rather the associated user (whose account might have been compromised). However, given the range of devices (e.g., laptop, mobile, and tablet) that a user might be using and the widespread use of DHCP, IP is not a reliable and consistent means of understanding the traffic from a user. This paper presents a novel approach to the identification of users from network traffic using only the metadata of the traffic (i.e. rather than payload) and the creation of application-level user interactions, which are proven to provide a far richer discriminatory feature set to enable more reliable identity verification. A study involving data collected from 46 users over a two-month period generated over 112 GBs of meta-data traffic was undertaken to examine the novel user-interaction based feature extraction algorithm. On an individual application basis, the approach can achieve recognition rates of 90%, with some users experiencing recognition performance of 100%. The consequence of this recognition is an enormous reduction in the volume of traffic an investigator has to analyse, allowing them to focus upon a particular suspect or enabling them to disregard traffic and focus upon what is left.
机译:互联网和基于云的应用程序的普及以及智能手机,平板电脑和智能手表的技术发展,导致用户比以往任何时候都更加依赖网络连接。结果,由此产生的网络流量占用的空间越来越大。对于网络取证检查员而言,在反取证日益挑战基于计算机取证的有效性的环境中,这种流量代表了独立证据的重要来源。今天,执行网络取证主要集中在基于Internet协议(IP)地址的分析上,因为这是唯一可用的特征。但是,更典型的情况是,调查人员实际上并不对IP地址感兴趣,而对相关用户(其帐户可能已经被盗用)感兴趣。但是,考虑到用户可能使用的设备范围(例如笔记本电脑,移动设备和平板电脑)以及DHCP的广泛使用,IP并不是理解用户流量的可靠且一致的方法。本文提出了一种仅使用流量的元数据(而不是有效载荷)从网络流量中识别用户的新颖方法,以及创建应用程序级用户交互的方法,事实证明,这种方法提供了更丰富的区分功能,可实现更可靠的身份验证。进行了一项涉及在两个月内从46个用户收集的数据并产生了112 GB的元数据流量的研究,以研究基于用户交互的新颖特征提取算法。在单个应用程序的基础上,该方法可以实现90%的识别率,并且某些用户的识别性能为100%。这种认可的结果是极大地减少了调查人员要分析的流量,从而使他们能够专注于特定犯罪嫌疑人,或者使他们能够忽略流量并专注于剩下的东西。

著录项

  • 来源
    《Computers & Security》 |2017年第9期|335-350|共16页
  • 作者

    N. Clarke; F. Li; S. Furnell;

  • 作者单位

    Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, United Kingdom,Security Research Institute, Edith Cowan University, WA, Australia;

    Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, United Kingdom;

    Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, United Kingdom,Security Research Institute, Edith Cowan University, WA, Australia,Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Biometrics; Digital forensics; Network forensics; Network metadata; Traffic analysis; User identification;

    机译:生物识别;数字取证;网络取证;网络元数据;流量分析;用户识别;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号