dc.contributor.author |
Ikuesan, Adeyemi Richard
|
|
dc.contributor.author |
Venter, H.S. (Hein)
|
|
dc.date.accessioned |
2020-02-06T08:09:16Z |
|
dc.date.issued |
2019-09 |
|
dc.description.abstract |
The need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication and authorization. However, the method applied in security is void of specific behavioral signature of a user, which inhibits its applicability in digital forensic science. This study investigated the likelihood of the observation of a unique signature from mouse dynamics of a computer user. An initial mouse path model was developed using non-finite automata. Thereafter, a set-theory based adaptive two-stage hash function and a multi-stage rule-based semantic algorithm were developed to observe the feasibility of a unique signature for forensic usage. An experimental process which comprises three existing mouse dynamics datasets were used to evaluate the applicability of the developed mechanism. The result showed a low likelihood of extracting unique behavioral signature which can be used in a user attribution process. Whilst digital forensic readiness mechanism could be a potential approach that can be used to achieve a reliable behavioral biometrics modality, the lack of unique signature presents a limitation. In addition, the result supports the logic that the current state of behavioral biometric modality, particularly mouse dynamics, is not suitable for forensic usage. Hence, the study concluded that whilst mouse dynamics-based behavioral biometrics may be a complementary modality in security studies, more will be required to adopt it as a forensic modality in litigation. Furthermore, the result from this study finds relevance in other human attributional studies such as user identification in recommender systems, e-commerce, and online profiling systems, where the degree of accuracy is not relatively high. |
en_ZA |
dc.description.department |
Computer Science |
en_ZA |
dc.description.embargo |
2020-09-01 |
|
dc.description.librarian |
hj2020 |
en_ZA |
dc.description.uri |
http://www.elsevier.com/locate/diin |
en_ZA |
dc.identifier.citation |
Ikuesan, A.R. & Venter, H.S. 2019, 'Digital behavioral-fingerprint for user attribution in digital forensics : are we there yet?', Digital Investigation, vol. 30, pp. 73-89. |
en_ZA |
dc.identifier.issn |
1742-2876 (print) |
|
dc.identifier.issn |
1873-202X (online) |
|
dc.identifier.other |
10.1016/j.diin.2019.07.003 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/73125 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
Elsevier |
en_ZA |
dc.rights |
© 2019 Elsevier Ltd. All rights reserved. Notice : this is the author’s version of a work that was accepted for publication in Digital Investigation. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. A definitive version was subsequently published in Digital Investigation, vol. 30, pp. 73-89, 2019. doi : 10.1016/j.diin.2019.07.003. |
en_ZA |
dc.subject |
User-attribution |
en_ZA |
dc.subject |
Digital forensic readiness |
en_ZA |
dc.subject |
Behavioral fingerprint |
en_ZA |
dc.subject |
Mouse dynamics |
en_ZA |
dc.subject |
A hash function |
en_ZA |
dc.title |
Digital behavioral-fingerprint for user attribution in digital forensics : are we there yet? |
en_ZA |
dc.type |
Postprint Article |
en_ZA |