Leveraging Biometrics For Insider Misuse Identification

International Journal On Cyber Situational Awareness (IJCSA)

ISSN: (Print) 2057-2182 ISSN: (Online) 2057-2182

DOI: 10.22619/IJCSA

Published Semi-annually. Est. 2014


Dr Cyril Onwubiko, Chair – Cyber Security & Intelligence, E-Security Group, Research Series, London, UK; IEEE UK & Ireland Section Secretary

Associate Editors:

Professor Frank Wang, Head of School / Professor of Future Computing, Chair IEEE Computer Society, UK&RI, School of Computing, University of Kent, Canterbury, UK

Dr Thomas Owens, Senior Lecturer & Director of Quality, Department of Electronic and Computer Engineering, Brunel University, London, UK

Leveraging Biometrics for Insider Misuse Identification

Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell


Insider misuse has become a real threat to many enterprises in the last decade. A major source of such threats originates from those individuals who have inside knowledge about the organization’s resources. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence, which provides a basis for investigating incidents. A key barrier however is often being able to associate an individual to the stolen data—especially when stolen credentials and the Trojan defense are two commonly cited arguments. This paper proposes an approach that can more inextricably link the use of information (e.g. images, documents and emails) to the individual users who use and access them through the use of transparent biometric imprinting. The use of transparent biometrics enables the covert capture of a user’s biometric information—avoiding the potential for forgery. A series of experiments are presented to evaluate the capability of retrieving the biometric information through a variety of file modification attacks. The preliminary feasibility study has shown that it is possible to correlate an individual’s biometric information with a digital object (images) and still be able to recover the biometric signal even with significant file modification.

Keywords: Digital forensics; biometrics; grille cipher; insider misuse; data leakage; guilty identification.

ISSN: 2057-2182

Volume 1. No. 1

DOI: 10.22619/IJCSA.2016.100107

Date: Nov. 2016

Reference to this paper should be made as follows: Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell (2016). Leveraging Biometrics for Insider Misuse Identification. International Journal on Cyber Situational Awareness, Vol. 1, No. 1, pp130-151.

PDF Download