2016 49th Hawaii International Conference on System Sciences (HICSS) 2016
DOI: 10.1109/hicss.2016.344
|View full text |Cite
|
Sign up to set email alerts
|

Explaining and Aggregating Anomalies to Detect Insider Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…It has three levels of explanation need to be considered to support the analyst such as consists of pre-computed single feature detection scores which available for examination, a collection of features or sets of features contributed to anomaly score from an individual detector for individual users and combinations of the contribution from different type of detectors that are incorporated into the ensemble computation of overall anomaly scores. From the level of explanation and approachable methods, PRODIGAL can give sureness to detect recognized, assumed insider threat situations, variations and the combination of situation [26]. Moreover, [27] proposed Corporate Insider Threat Detection (CITD) system which is capable of gaining a general feature set that characterizes the user's current activity in the organization at former time steps and amongst several users.…”
Section: 2insider Threats Cause By System Factormentioning
confidence: 99%
See 1 more Smart Citation
“…It has three levels of explanation need to be considered to support the analyst such as consists of pre-computed single feature detection scores which available for examination, a collection of features or sets of features contributed to anomaly score from an individual detector for individual users and combinations of the contribution from different type of detectors that are incorporated into the ensemble computation of overall anomaly scores. From the level of explanation and approachable methods, PRODIGAL can give sureness to detect recognized, assumed insider threat situations, variations and the combination of situation [26]. Moreover, [27] proposed Corporate Insider Threat Detection (CITD) system which is capable of gaining a general feature set that characterizes the user's current activity in the organization at former time steps and amongst several users.…”
Section: 2insider Threats Cause By System Factormentioning
confidence: 99%
“…Beside human factor explained above, the study also has been conducted on some features of system factor such as repeated improper behavior [26] which can be described as what consequences of system failure that contribute to the reputation of an organizational or production fields. Other than that, author [41] reported one of the contributing factors of system failure when employee frequently gives respond to any phishing email.…”
Section: Framework Of Automated Manufacturing Execution Systemmentioning
confidence: 99%
“…Mitigation techniques can be also developed following e.g., [41]. The idea would be to develop a SMAll helper service that monitors workflows and, once an attack by an insider is discovered, it appropriately redirects the workflow to avoid further damage.…”
Section: Travelmentioning
confidence: 99%
“…[12] We present findings from experiments to detect instances of insider threat scenarios inserted into a real database from monitored activity on users' computers seeded with independently-…”
Section: Introductionmentioning
confidence: 99%