2013 IEEE Security and Privacy Workshops 2013
DOI: 10.1109/spw.2013.32
|View full text |Cite
|
Sign up to set email alerts
|

Use of Domain Knowledge to Detect Insider Threats in Computer Activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
27
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 3 publications
1
27
0
1
Order By: Relevance
“…Experiments and results included in this paper extend previously reported results ( [21], [24], [25]) to cover 16 months of data from September 2012 through February 2014. Testing on the additional eight months included a number of new Red Team (RT) scenarios, new detection algorithms, and improved versions of existing detectors.…”
supporting
confidence: 55%
See 3 more Smart Citations
“…Experiments and results included in this paper extend previously reported results ( [21], [24], [25]) to cover 16 months of data from September 2012 through February 2014. Testing on the additional eight months included a number of new Red Team (RT) scenarios, new detection algorithms, and improved versions of existing detectors.…”
supporting
confidence: 55%
“…Characterizing behavior demonstrated by users in online social communities such as deception ( [3]) and negative predisposition toward law enforcement ( [13]) can be relevant to the insider threat domain. Machine learning techniques, such as outlier detection [2] and unsupervised anomaly detection [7], have likewise shown utility for identifying insider threat activiites in large, complex data sets ( [9], [24]). Finally, the efficacy of ensembles of detectors has been shown ( [1], [8]) and inspired our approach.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Fusion algorithm is used to combine anomaly from multiple source of information. William T.Young et al, [10] this paper presents the realistic associate menace instances in a real company database of computer custom activity. Area vision is requested (1) to select appropriate features for use by structural anomaly detection algorithms, (2) to recognize features indicative of attention recognized to be associated alongside associate menace, and (3) to ideal recognized or distrusted instances of associate menace scenarios.…”
Section: Related Workmentioning
confidence: 99%