2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2018
DOI: 10.1109/asonam.2018.8508599
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Data-Driven Physical Security and Insider Threat Detection

Abstract: This paper presents PS0, an ontological framework and a methodology for improving physical security and insider threat detection. PS0 can facilitate forensic data analysis and proactively mitigate insider threats by leveraging rule-based anomaly detection. In all too many cases, rule-based anomaly detection can detect employee deviations from organizational security policies. In addition, PS0 can be considered a security provenance solution because of its ability to fully reconstruct attack patterns. Provenanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Moreover, an ontology-based framework for improving physical security and insider threat detection [86] can also be useful considering it supports threat detection using rule-based anomaly detection, forensic data analysis for attack attribution and thwarts deception, reconstructing complex attack patterns for enriching and sharing intelligence, as well as continuous security compliance monitoring. Live, network, and memory forensics are useful in detecting the footprint of insider threats.…”
Section: Malicious Insiders In the Cloud Environmentmentioning
confidence: 99%
“…Moreover, an ontology-based framework for improving physical security and insider threat detection [86] can also be useful considering it supports threat detection using rule-based anomaly detection, forensic data analysis for attack attribution and thwarts deception, reconstructing complex attack patterns for enriching and sharing intelligence, as well as continuous security compliance monitoring. Live, network, and memory forensics are useful in detecting the footprint of insider threats.…”
Section: Malicious Insiders In the Cloud Environmentmentioning
confidence: 99%
“…So far, there is rare research on the rule-based anomaly detection method of cellular network except [8]. However, there are still many rule-based exception detection methods in other fields that are worth referring to, such as [9][10][11][12][13].…”
Section: Rule-based Methodsmentioning
confidence: 99%
“…Another study by Zou et al [175] used the door and sensor data features to explore the use of the failure mode and effect analysis method. Mavroeidis et al [176] presented an ontological framework to improve physical security and insider threat detection using door access. Lastly, W. Meng et al [177] used Euclidean distance to judge a node's reputation and combed multisource logs, such as emails, websites, and camera usage.…”
Section: Physical Behaviorsmentioning
confidence: 99%