2015 IEEE Symposium on Visualization for Cyber Security (VizSec) 2015
DOI: 10.1109/vizsec.2015.7312772
|View full text |Cite
|
Sign up to set email alerts
|

Visualizing the insider threat: challenges and tools for identifying malicious user activity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(29 citation statements)
references
References 20 publications
0
28
0
1
Order By: Relevance
“…VisImpact correlates variables of purchase quarter (i.e., temporal details), fraud amount, and fraud count to reveal relationships among important factors. Legg [106] identifies insider threats in an organization by inspecting multidimensional data including the number of times that the user performs particular tasks, number of these activities that are new to this user and to any user in this same position.…”
Section: A Data Typesmentioning
confidence: 99%
See 2 more Smart Citations
“…VisImpact correlates variables of purchase quarter (i.e., temporal details), fraud amount, and fraud count to reveal relationships among important factors. Legg [106] identifies insider threats in an organization by inspecting multidimensional data including the number of times that the user performs particular tasks, number of these activities that are new to this user and to any user in this same position.…”
Section: A Data Typesmentioning
confidence: 99%
“…When analyzing transaction behavior, categories derived from text help describe the relationship between a payer and a payee [108], [109], label different types of activities conducted by employees [106], and identify the type of state changes in a business process [100]. Text data is used to distinguish between senders, intermediates, and receivers in financial transactions, and to build profiles for analyzing their potential suspicious behaviors.…”
Section: A Data Typesmentioning
confidence: 99%
See 1 more Smart Citation
“…The textbooks by Marty [11] and Conti [4] also illustrate a number of different techniques for how visualization can help better understand the problems that exist within security. More recently, works such as [8], [10], [3] have all addressed how expert security analysts can visualize network or user activity data in large organisation environments. There are many different commercial and open-source tools available online for monitoring and analysing network activity.…”
Section: Introductionmentioning
confidence: 99%
“…The textbooks by Marty (Marty, 2008) and Conti (Conti, 2007) also illustrate a number of different techniques for how visualization can help better understand the problems that exist within security. More recently, works such as (Gray, 2015), (Legg, 2015), (Cappers, 2015) have all addressed how expert security analysts can visualize network or user activity data in large organisation environments. There are many different commercial and open-source tools available online for monitoring and analysing network activity.…”
Section: Introductionmentioning
confidence: 99%