2018 IEEE Security and Privacy Workshops (SPW) 2018
DOI: 10.1109/spw.2018.00038
|View full text |Cite
|
Sign up to set email alerts
|

Simulated User Bots: Real Time Testing of Insider Threat Detection Systems

Abstract: The insider threat is one of the most serious security problems faced by modern organizations. High profile cases demonstrate the serious consequences of successful attacks. The problem has been studied for many years leading to a number of technologies and products that have been widely deployed in government and commercial enterprises. A fundamental question is how well do these systems work? How may they be tested and how computationally expensive a widely deployed monitoring infrastructure cost? Measuring … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 22 publications
1
4
0
Order By: Relevance
“…In other words, our synthetic data, for all but privacy infractions, was the same. 143 What is more, even beyond our case study, similar research concurs in our results: Synthetic data is a valid alternative to original data. 144 A budding body of research has found that when comparing analysis using original data to analysis using synthetic data, for the most part, the results are indistinguishable, even by domain experts.…”
Section: Evaluation Of Synthetic Datasupporting
confidence: 89%
“…In other words, our synthetic data, for all but privacy infractions, was the same. 143 What is more, even beyond our case study, similar research concurs in our results: Synthetic data is a valid alternative to original data. 144 A budding body of research has found that when comparing analysis using original data to analysis using synthetic data, for the most part, the results are indistinguishable, even by domain experts.…”
Section: Evaluation Of Synthetic Datasupporting
confidence: 89%
“…This research aims to catalog human as well as technical factors associated with insider threat risks to inform the development of more proactive approaches to insider threat assessment. In [12], the detection of the insider is based on a real-time testing simulation of real users, generating user data to test the detection of malicious users. We found other updated and relevant resources in [13] which is one of the latest surveys that summarized techniques for insider threat identification and detection.…”
Section: Context and Related Workmentioning
confidence: 99%
“…Yet, all of the abovementioned methods mainly preserve statistics of various traffic characteristics but lack the ability to preserve common sequences within the traffic. Dutta et al [4] present a framework for simulating user bots by imitating the actions of real users and demonstrate its successful implementation for intrusion detection. While their work is based on predefined rules, we will approach a similar task with machine learning techniques that will allow an automated extraction of real user behavior.…”
Section: Traffic Generationmentioning
confidence: 99%
“…The "usefulness" of synthetic data has been validated by studies like [1][2][3][4]. In this study we examine the use of synthetic data on another type of data, network traffic data.…”
mentioning
confidence: 99%