Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats 2016
DOI: 10.1145/2995959.2995964
|View full text |Cite
|
Sign up to set email alerts
|

A New Take on Detecting Insider Threats

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 114 publications
(22 citation statements)
references
References 18 publications
2
17
0
Order By: Relevance
“…It should be noted here that the results are obtained from a single trained model on numerical data in each data types, instead of a model for each user on sequential data as in HMM‐based approaches 21,22 . The obtained results are also comparable with what achieved using HMM (on CERT r4.2 weekly data) in Rashid et al 21 and Le and Zincir‐Heywood 22 . Furthermore, the anomaly detection models make no assumptions about the “purity” of the training data, unlike one class SVM‐based approaches.…”
Section: Evaluation and Resultssupporting
confidence: 68%
See 2 more Smart Citations
“…It should be noted here that the results are obtained from a single trained model on numerical data in each data types, instead of a model for each user on sequential data as in HMM‐based approaches 21,22 . The obtained results are also comparable with what achieved using HMM (on CERT r4.2 weekly data) in Rashid et al 21 and Le and Zincir‐Heywood 22 . Furthermore, the anomaly detection models make no assumptions about the “purity” of the training data, unlike one class SVM‐based approaches.…”
Section: Evaluation and Resultssupporting
confidence: 68%
“…Gavai et al applied different machine learning‐based methods on organizational activity data for anomaly and quitter detection, 17 which are considered the indicators of potential insider‐related activities. More recently, Rashid et al used HMMs to model users' weekly activity sequences and detect possible insider threats from the subtle changes in weekly user activities, which are indicated by HMM probabilities (of user sequences) that are lower than a given threshold 21 . Self‐organizing maps, another unsupervised learning algorithm, has been used in Le and Zincir‐Heywood 22 for clustering and visualization of normal and insider user activities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If the data had a large edit distance from all patterns in the dictionaries, it was detected as an anomaly. In other anomaly detection approaches, the sequences of insiders acts are modeled to detect any deviations from such sequences [30,31]. The authors in [31] employed a Hidden Markov Model to model the sequences of normal users acts in a weekly basis, thus, any anomalous acts are detected they were considered as potential insider threats.…”
Section: Related Workmentioning
confidence: 99%
“…al. [5] proposed a novel method to detect insider threats by using Hidden Markov Model (HMM). Given the user computer usage logs which contains detailed information about login / logoff, web access, USB connection, and email, they transform those logs to simple integer sequences by categorizing to seven event types.…”
Section: Related Workmentioning
confidence: 99%