2014
DOI: 10.1109/tcss.2014.2377811
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data

Abstract: The problem of insider threat is receiving increasing attention both within the computer science community as well as government and industry. This paper starts by presenting a broad, multidisciplinary survey of insider threat capturing contributions from computer scientists, psychologists, criminologists, and security practitioners. Subsequently, we present the behavioral analysis of insider threat (BAIT) framework, in which we conduct a detailed experiment involving 795 subjects on Amazon Mechanical Turk (AM… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
1
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 110 publications
(61 citation statements)
references
References 70 publications
0
59
1
1
Order By: Relevance
“…There are some works that propose hybridization of sampling and cost-sensitive learning [57]. Behavior analysis [3] Recognition of dangerous behavior (binary problem)…”
Section: Tackling Imbalanced Datamentioning
confidence: 99%
“…There are some works that propose hybridization of sampling and cost-sensitive learning [57]. Behavior analysis [3] Recognition of dangerous behavior (binary problem)…”
Section: Tackling Imbalanced Datamentioning
confidence: 99%
“…In addition to above author, [18] approaches the scope of insider threats into unintentional insider threats which define as a current or former employee, contractor, or business partner who has or had authorized access to an organization's network, system, or data and who, through action or inaction without malicious intent, unwittingly causes harm or substantially increases the probability of future serious harm to the confidentiality, integrity, or availability of the organization's resources or assets, including information, information systems, or financial systems. The unintentional factors have few categorizations into organizational factor, i.e.…”
Section: 1insider Threats Cause By Human Factormentioning
confidence: 98%
“…Insider threat research [35] shares some similarities with the APT problem as well. Indeed, an APT aims to take control of a legitimate host inside of an organization, and the attacker will try to emulate normal behavior in order to avoid detection.…”
Section: Insider Threatmentioning
confidence: 98%