2012
DOI: 10.1109/tdsc.2012.11
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Anomalous Insiders in Collaborative Information Systems

Abstract: Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(47 citation statements)
references
References 51 publications
0
47
0
Order By: Relevance
“…The goal of these questions is to determine if the findings of the study are replicable. Five studies have a low risk of bias -Chen et al [13], Eberie et al [34], Parveen et al [12], Raissi-Dehkordi et al [21], and Yu et al [23] and the remaining eight studies have a high risk of bias (Table 4, Fig. 14).…”
Section: Publication Qualitymentioning
confidence: 99%
See 2 more Smart Citations
“…The goal of these questions is to determine if the findings of the study are replicable. Five studies have a low risk of bias -Chen et al [13], Eberie et al [34], Parveen et al [12], Raissi-Dehkordi et al [21], and Yu et al [23] and the remaining eight studies have a high risk of bias (Table 4, Fig. 14).…”
Section: Publication Qualitymentioning
confidence: 99%
“…Figure 5 shows the number of selected papers used these feature vectors. A total of 35 studies were included in this survey [12][13][14][15][16][17][18][19][20][21][22][23][24]. Table 2 presents the features that belong to these domains and the sources of information for each feature domain.…”
Section: B) Opportunitymentioning
confidence: 99%
See 1 more Smart Citation
“…Chen and colleagues described the application of relational data mining to detect anomalies in the accesses to communities information systems [179]. The study by Peissig and colleagues used Inductive Logic Programming (ILP) -a method that infers an hypothesis from the analysis of the background knowledge and examples -to derive phenotypes from EHR data [180].…”
Section: G Mining Structured Clinical Datamentioning
confidence: 99%
“…The access control decision function (DF ) (Definition 23) takes the access request (Q) (Definition 21) as an input and returns a Boolean value presenting the access control decision. The pre-condition for the success of DF is as shown in (21) and (22). In the worst case, the complexity of WBAC's DF is O(card(act r (usr)) + (card(w) × card(team member ))).…”
Section: Wbac Performance Analysismentioning
confidence: 99%