2017
DOI: 10.1109/jsyst.2015.2438442
|View full text |Cite
|
Sign up to set email alerts
|

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

Abstract: Abstract-Organisations are experiencing an ever-growing concern of how to identify and defend against insider threats. Those who have authorised access to sensitive organisational data are placed in a position of power that could well be abused and could cause significant damage to an organisation. This could range from financial theft and intellectual property theft, through to the destruction of property and business reputation. Traditional intrusion detection systems are not designed, nor are capable, of id… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
77
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 108 publications
(77 citation statements)
references
References 23 publications
0
77
0
Order By: Relevance
“…Traditionally, distance measurements have been applied to text analysis [1,2] and speech based matching [3,4]. Our work most closely matches classification techniques such as -NN and PCA as applied by [14] and [15], respectively. However, in the case of our distance measurement implementations, we only consider one set of prior data rather than attempt to classify 'normal' and 'anomalous' behaviour based on the whole range of available data.…”
Section: Related Workmentioning
confidence: 69%
See 2 more Smart Citations
“…Traditionally, distance measurements have been applied to text analysis [1,2] and speech based matching [3,4]. Our work most closely matches classification techniques such as -NN and PCA as applied by [14] and [15], respectively. However, in the case of our distance measurement implementations, we only consider one set of prior data rather than attempt to classify 'normal' and 'anomalous' behaviour based on the whole range of available data.…”
Section: Related Workmentioning
confidence: 69%
“…Recent work in the application of data analytic techniques against the CERT dataset include [12][13][14][15]. The work of [13] focuses on the CERT r6.2 dataset and uses Deep Neural Networks (DNN) and Recurrent Neural Networks (RNN) to calculate an anomaly score of each individual user.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Previous studies have grouped the features associated with motives into four broad categories [14,17,25,34,[38][39][40]:…”
Section: A) Motivementioning
confidence: 99%
“…The topic of insider threat detection has received many attentions in the literature. Traditional intrusion detection system is neither designed for nor capable of identifying those who act maliciously within an organization [3]. Researchers have proposed a number of systems and approaches to detect or predict insider threat based on different types of activities.…”
Section: Related Workmentioning
confidence: 99%