Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society 2013
DOI: 10.1145/2517840.2517865
|View full text |Cite
|
Sign up to set email alerts
|

Proactive insider threat detection through social media

Abstract: Insider threat is a major issue in cyber and corporate security. In this paper we study the psychosocial perspective of the insider via social media, Open Source Intelligence, and user generated content classification. Inductively, we propose a prediction method by evaluating the predisposition towards law enforcement and authorities, a personal psychosocial trait closely connected to the manifestation of malevolent insiders. We propose a methodology to detect users holding a negative attitude towards authorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 39 publications
(23 citation statements)
references
References 23 publications
0
22
0
1
Order By: Relevance
“…Researchers have also attempted to monitor and profile unauthorised users [16], [17] or witting insiders performing unauthorised actions [18]. However, semantic social engineering attacks target authorised users and lure them into performing an authorised (albeit compromising) action.…”
Section: Predicting Susceptibility a Related Workmentioning
confidence: 99%
“…Researchers have also attempted to monitor and profile unauthorised users [16], [17] or witting insiders performing unauthorised actions [18]. However, semantic social engineering attacks target authorised users and lure them into performing an authorised (albeit compromising) action.…”
Section: Predicting Susceptibility a Related Workmentioning
confidence: 99%
“…In a study [17], authors proposed a prediction method to identify the users having the negative or positive behavior towards the law enforcement authority. The research study used machine learning and dictionarybased techniques to identify the negative attitude towards law authority.…”
Section: Related Workmentioning
confidence: 99%
“…Understanding complex human behaviors in enterprise environments supports the identification of patterns of activity in computer usage data related to behaviors associated with insider threat actions, such as quitting ( [10], [5]). Characterizing behavior demonstrated by users in online social communities such as deception ( [3]) and negative predisposition toward law enforcement ( [13]) can be relevant to the insider threat domain. Machine learning techniques, such as outlier detection [2] and unsupervised anomaly detection [7], have likewise shown utility for identifying insider threat activiites in large, complex data sets ( [9], [24]).…”
Section: Introductionmentioning
confidence: 99%