{"id":"https://openalex.org/W2588937729","doi":"https://doi.org/10.1109/icitst.2016.7856712","title":"User profiling from network traffic via novel application-level interactions","display_name":"User profiling from network traffic via novel application-level interactions","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2588937729","doi":"https://doi.org/10.1109/icitst.2016.7856712","mag":"2588937729"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2016.7856712","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856712","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/2980","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089374595","display_name":"Gaseb Alotibi","orcid":"https://orcid.org/0000-0001-8575-9654"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Gaseb Alotibi","raw_affiliation_strings":["Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029670131","display_name":"Nathan Clarke","orcid":"https://orcid.org/0000-0002-3595-3800"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Nathan Clarke","raw_affiliation_strings":["Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom","Security Research Institute, Edith Cowan University, Western, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Western, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100654159","display_name":"Fudong Li","orcid":"https://orcid.org/0000-0002-0986-0491"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Fudong Li","raw_affiliation_strings":["Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["AU","GB","ZA"],"is_corresponding":false,"raw_author_name":"Steven Furnell","raw_affiliation_strings":["Center for Research in Information and Cyber Security, Nelson MandelaMetropolitan University, Port Elizabeth, South Africa","Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom","Security Research Institute, Edith Cowan University, Western, Australia"],"affiliations":[{"raw_affiliation_string":"Center for Research in Information and Cyber Security, Nelson MandelaMetropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]},{"raw_affiliation_string":"Centre for Security, Communications and Network Research (CSCAN) Plymouth University, Plymouth, United Kingdom","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Western, Australia","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089374595"],"corresponding_institution_ids":["https://openalex.org/I897542642"],"apc_list":null,"apc_paid":null,"fwci":2.0761,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.89287852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2016","issue":null,"first_page":"279","last_page":"285"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8270364999771118},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.8253766298294067},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.7382811903953552},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.7314995527267456},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.5137711763381958},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5122079253196716},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4438513517379761},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4256705045700073},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34627699851989746},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3328809440135956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8270364999771118},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.8253766298294067},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.7382811903953552},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.7314995527267456},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.5137711763381958},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5122079253196716},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4438513517379761},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4256705045700073},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34627699851989746},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3328809440135956},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icitst.2016.7856712","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856712","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-3985","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/2980","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},{"id":"mag:2752786273","is_oa":false,"landing_page_url":"http://jglobal.jst.go.jp/en/public/20090422/201702236604518626","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-3985","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/2980","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1559650014","display_name":null,"funder_award_id":"EP/K03345X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1503562643","https://openalex.org/W1988936727","https://openalex.org/W1990312847","https://openalex.org/W2019669975","https://openalex.org/W2030102079","https://openalex.org/W2053819965","https://openalex.org/W2115775347","https://openalex.org/W2116065364","https://openalex.org/W2155889930","https://openalex.org/W2158286184","https://openalex.org/W2161406213","https://openalex.org/W2241534552","https://openalex.org/W2255206882","https://openalex.org/W2266456207","https://openalex.org/W2330003156","https://openalex.org/W2766595557","https://openalex.org/W2796585648","https://openalex.org/W2912953040","https://openalex.org/W6630245695","https://openalex.org/W6677305135","https://openalex.org/W6702072519","https://openalex.org/W6745620387","https://openalex.org/W6758647617"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W4387194049","https://openalex.org/W2018332730","https://openalex.org/W2286217954"],"abstract_inverted_index":{"Insider":[0],"misuse":[1],"has":[2,12,27],"become":[3],"a":[4,111,117,143,179],"significant":[5],"issue":[6],"for":[7],"organisations.":[8],"Traditional":[9],"information":[10,58],"security":[11],"focussed":[13],"upon":[14,104],"threats":[15],"from":[16,116,145,164,183],"the":[17,35,48,68,81,89,95,168,196],"outside":[18],"rather":[19,63],"than":[20,64],"employees.":[21],"A":[22],"wide":[23],"range":[24],"of":[25,51,92,98,157,167,176,189],"research":[26],"been":[28],"undertaken":[29],"to":[30,33,40,60,74,88,107,153],"develop":[31],"approaches":[32],"detect":[34],"insider":[36],"-":[37],"often":[38,79],"referred":[39],"as":[41],"Data":[42],"Loss":[43],"Prevention":[44],"(DLP)":[45],"tools.":[46],"Unfortunately,":[47],"fundamental":[49],"limitation":[50],"these":[52],"tools":[53],"is":[54,70,78],"that":[55,122,130,160],"they":[56,131,137],"provide":[57],"resolved":[59],"IP":[61,69,99],"addresses":[62],"people.":[65],"This":[66,101],"assumes":[67],"static":[71],"and":[72,94,109,202,208],"linkable":[73],"an":[75],"individual,":[76],"which":[77],"not":[80,128],"case.":[82],"IPs":[83],"are":[84,132,138,204],"increasingly":[85],"unreliable":[86],"due":[87],"mobile":[90],"natural":[91],"devices":[93],"dynamic":[96],"allocation":[97],"addresses.":[100],"paper":[102],"builds":[103],"prior":[105],"work":[106],"propose":[108],"investigate":[110],"biometric-based":[112],"behavioural":[113],"profile":[114],"created":[115],"novel":[118],"feature":[119],"extraction":[120],"process":[121],"identifies":[123],"user's":[124,158],"application-level":[125],"interactions":[126,159],"(e.g.":[127],"simply":[129],"accessing":[133],"Facebook":[134],"but":[135],"whether":[136],"posting,":[139],"reading":[140],"or":[141],"watching":[142],"video)":[144],"raw":[146],"network":[147],"traffic":[148],"metadata.":[149],"It":[150],"also":[151],"proceeds":[152],"describe":[154],"various":[155],"types":[156],"can":[161],"be":[162],"derived":[163],"applications.":[165],"Validation":[166],"model":[169],"was":[170],"conducted":[171],"by":[172],"collecting":[173],"62":[174],"GBs":[175],"metadata":[177],"over":[178],"2":[180],"months":[181],"period":[182],"27":[184],"participants.":[185],"The":[186],"average":[187],"results":[188],"identifying":[190],"users":[191],"at":[192],"first":[193],"rank":[194],"in":[195],"top":[197],"three":[198],"applications":[199],"Skype,":[200],"Hotmail":[201],"BBC":[203],"scored":[205],"98.1%,":[206],"96.2%":[207],"81.8%":[209],"respectively.":[210]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
