2008
DOI: 10.1504/ijsn.2008.017224
|View full text |Cite
|
Sign up to set email alerts
|

Using PLSI-U to detect insider threats by datamining e-mail

Abstract: Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an approach to assist investigators in identifying potential insider threats. We discern employees interests from e-mail using an extended version of PLSI. These interests are transformed into implicit and explicit social network graphs, which are used to locate potential insiders by identifying individuals who feel alienated from the organisation or have a hidden in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 6 publications
(3 reference statements)
0
17
0
Order By: Relevance
“…Maloof and Stephens [13] propose a detection tool for when insiders violate need-toknow restrictions that are in place within the organisation. Okolica et al [14] use Probabilistic Latent Semantic Indexing with Users to determine employee interests, which are used to form social graphs that can highlight insiders. Liu et al [15] propose a multilevel framework called SIDD (Sensitive Information Disseination Detection) that incorporates networklevel application identification, content signature generation and detection, and covert communication detection.…”
Section: Related Workmentioning
confidence: 99%
“…Maloof and Stephens [13] propose a detection tool for when insiders violate need-toknow restrictions that are in place within the organisation. Okolica et al [14] use Probabilistic Latent Semantic Indexing with Users to determine employee interests, which are used to form social graphs that can highlight insiders. Liu et al [15] propose a multilevel framework called SIDD (Sensitive Information Disseination Detection) that incorporates networklevel application identification, content signature generation and detection, and covert communication detection.…”
Section: Related Workmentioning
confidence: 99%
“…The inside attackers are current or former employees who have certain knowledge about the system . A typical inside attacker is a curious DBA, who has full access to the DBMS server.…”
Section: Framework and Main Threatsmentioning
confidence: 99%
“…Maloof and Stephens [12] propose a detection tool for when insiders violate need-toknow restrictions that are in place within the organisation. Okolica et al [13] use Probabilistic Latent Semantic Indexing with Users to determine employee interests, which are used to form social graphs that can highlight insiders. Liu et al [14] propose a multilevel framework called SIDD (Sensitive Information Dissemination Detection) that incorporates networklevel application identification, content signature generation and detection, and covert communication detection.…”
Section: Related Workmentioning
confidence: 99%