DOI: 10.1007/978-0-387-77322-3_5
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Insider Attack Detection Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
114
0
2

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 214 publications
(116 citation statements)
references
References 17 publications
0
114
0
2
Order By: Relevance
“…Some augment this basic approach by introducing decoys onto the network to entrap adversarial insiders [16], [17]. A survey of much of this work is here, [18]. In addition, various models of adversarial insiders have been developed.…”
Section: Related Workmentioning
confidence: 99%
“…Some augment this basic approach by introducing decoys onto the network to entrap adversarial insiders [16], [17]. A survey of much of this work is here, [18]. In addition, various models of adversarial insiders have been developed.…”
Section: Related Workmentioning
confidence: 99%
“…It has been found that attackers using identity theft to masquerade as valid users often exhibit abnormal behavior (Salem, 2008). This would be a possible method for use in the detection of masquerades on the network.…”
Section: The Insider Threatmentioning
confidence: 99%
“…Even most recent studies estimate that no mechanism exists to prevent insider abuse [11]. According to [12], there seems to be little design and technology available to address the insider threat problem. However, many forms of attack have been reported:…”
Section: Risks Related With Treatment Process and Data Analysis: The mentioning
confidence: 99%