2012
DOI: 10.1080/19393555.2011.654318
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Insider Threats: Solutions and Trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…Other researchers [49] also conducted an analytical study that compares several proposed solutions to detect and prevent insider threats and their ineffectiveness in real time to subvert insider threat attacks. This study discussed several approaches based on intrusion prevention, system calls, visualization, a data-driven approach, antiindirect exfiltration, a dynamic-system-theory-based approach, and honeynets to combat insider threats.…”
Section: B Insider Threats and Countermeasuresmentioning
confidence: 99%
“…Other researchers [49] also conducted an analytical study that compares several proposed solutions to detect and prevent insider threats and their ineffectiveness in real time to subvert insider threat attacks. This study discussed several approaches based on intrusion prevention, system calls, visualization, a data-driven approach, antiindirect exfiltration, a dynamic-system-theory-based approach, and honeynets to combat insider threats.…”
Section: B Insider Threats and Countermeasuresmentioning
confidence: 99%
“…Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. (Zeadally, 2012). This is highly contributed by the constant change in technology and also the untamed employee needs which vary from one organization to the other.…”
Section: Understanding the Insider Cyber Security Threatsmentioning
confidence: 99%
“…The insider literature is extensive, although a significant portion [15] focuses on describing specific controls or countermeasures for combating a limited range of insider threat types [9,[16][17][18][19][20][21][22]. Controls for insiders range from physical and technical to behavioural and organisational [1,10].…”
Section: Introductionmentioning
confidence: 99%