2011 44th Hawaii International Conference on System Sciences 2011
DOI: 10.1109/hicss.2011.231
|View full text |Cite
|
Sign up to set email alerts
|

Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Although there are limitations when analyzing the massive amounts data using visualization techniques, researchers have started using visualization techniques to find anomalies in security threats (Ferebee & Dasgupta, 2006;Kasemsri, 2006). More specifically, there are two categories of visualization techniques that are aimed at insider threat analysis: pixel-oriented color maps (Colombe & Stephens, 2004) and graph-based visualization (Eberle & Holder, 2009;Nance & Marty, 2011). Colombe and Stephens designed a visualization approach that maps pixeloriented color maps to measured frequencies of certain symbols that have appeared in network traffic in order to detect anomalies visually.…”
Section: Visualization Approachesmentioning
confidence: 99%
“…Although there are limitations when analyzing the massive amounts data using visualization techniques, researchers have started using visualization techniques to find anomalies in security threats (Ferebee & Dasgupta, 2006;Kasemsri, 2006). More specifically, there are two categories of visualization techniques that are aimed at insider threat analysis: pixel-oriented color maps (Colombe & Stephens, 2004) and graph-based visualization (Eberle & Holder, 2009;Nance & Marty, 2011). Colombe and Stephens designed a visualization approach that maps pixeloriented color maps to measured frequencies of certain symbols that have appeared in network traffic in order to detect anomalies visually.…”
Section: Visualization Approachesmentioning
confidence: 99%
“…We screened 177 abstracts, evaluated 50 full-text articles, and included 37 articles-a total of 22 studies (59 %) propose novel IDPAs [9,. The other 15 papers either propose new features for IDP or discusses challenges associated with IDP [33][34][35][36][37][38][39][40][41][42][43][44][45][46][47]. Figure 1 presents the flow chart of the study selection process.…”
Section: Study Selectionmentioning
confidence: 99%
“…It includes tools that visually detect anomalies and possible attacks through pattern matching [7] or by using machine learning to check for anomalous behavior [1]. Other tools establish acceptable action patterns to easily detect anomalous patterns [17]. These tools use visualizations like color maps [7] and different types of graphs like attack-pattern trees [1] or bipartite graphs [17].…”
Section: Background Literaturementioning
confidence: 99%
“…Other tools establish acceptable action patterns to easily detect anomalous patterns [17]. These tools use visualizations like color maps [7] and different types of graphs like attack-pattern trees [1] or bipartite graphs [17].…”
Section: Background Literaturementioning
confidence: 99%