A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä
A framework for behavior-based detection of user substitution in a mobile context (2006)


Mazhelis, O., & Puuronen, S. (2006). A framework for behavior-based detection of user substitution in a mobile context. Computers & Security, 26(2), 154-176. https://doi.org/10.1016/j.cose.2006.08.010


JYU-tekijät tai -toimittajat


Julkaisun tiedot

Julkaisun kaikki tekijät tai toimittajatMazhelis, Oleksiy; Puuronen, Seppo

Lehti tai sarjaComputers & Security

ISSN0167-4048

eISSN1872-6208

Julkaisuvuosi2006

Volyymi26

Lehden numero2

Artikkelin sivunumerot154-176

KustantajaElsevier

JulkaisumaaAlankomaat

Julkaisun kielienglanti

DOIhttps://doi.org/10.1016/j.cose.2006.08.010

Julkaisun avoin saatavuusEi avoin

Julkaisukanavan avoin saatavuus


Tiivistelmä

Personal mobile devices, such as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by unintended persons may result in severe security breaches concerning private or corporate data and services. Organizations develop their security policy and employ preventive techniques to combat unauthorized use. Current solutions, however, are still breakable and there is a strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define the measures to be monitored.
In this paper, a structured conceptual framework for mobile-user substitution detection is proposed. The framework is based on the idea that some aspects of user behavior and environment reflect the user's personality in a recognizable way. These hypothesized aspects are further studied in order to identify the characteristics describing the individuality of these aspects, and to identify the measures whereby the characteristics can be represented.
The main constructs of the framework are defined and explained in the paper; these include the components describing individuality of user behavior and environment, and the technical components needed to implement user substitution detection based on this individuality. The paper also provides a tentative list of individual behavioral and environmental aspects, along with characteristics and measures to represent them. The contemporary solutions, aimed at user substitution detection, are analyzed from the perspective of the framework, and the needs for further research are discussed.


YSO-asiasanatmobiililaitteetmatkapuhelimetälytekniikkasuojaustietoturvakäyttäjätprofilointitunnisteetmittarit (mittaus)

Vapaat asiasanatMobile devices; Intrusion detection; Masquerader detection; User profiling; Identity verification


Liittyvät organisaatiot


OKM-raportointiKyllä

Alustava JUFO-tasoNot rated


Viimeisin päivitys 2023-14-12 klo 19:06