2011
DOI: 10.21236/ada610463
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination

Abstract: This material has been approved for public release and unlimited distribution except as restricted below.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…More specifically, these are approaches can be categorised as rulebased, graph-based, statistical and machine/deep learningbased [2]. As Table 1 shows, previous approaches tended to be rule-based, such as [5], [11], and [12]. These approaches all focused on detecting insiders who undertake data exfiltration activities, leveraging a series of rules to expose unusual access to files and directories [11], access to data without a 'need-to-know' requirement [5], or transfers of large amounts of data to recipients who do not exist in the organisational white-listed name-space [12].…”
Section: Related Workmentioning
confidence: 99%
“…More specifically, these are approaches can be categorised as rulebased, graph-based, statistical and machine/deep learningbased [2]. As Table 1 shows, previous approaches tended to be rule-based, such as [5], [11], and [12]. These approaches all focused on detecting insiders who undertake data exfiltration activities, leveraging a series of rules to expose unusual access to files and directories [11], access to data without a 'need-to-know' requirement [5], or transfers of large amounts of data to recipients who do not exist in the organisational white-listed name-space [12].…”
Section: Related Workmentioning
confidence: 99%
“…The other model, the Ambitious Leader, characterized insiders who recruit others to steal information, either to develop or benefit a competing organization. More recently, the CERT Insider Threat center has focused on detecting intellectual property theft around the time of employee termination, with Hanley and Montelibano publishing a control and Moore et al publishing a pattern on the subject (Hanley and Montelibano 2011;Moore et al 2012). Additionally, Shaw and Stock published a white paper on the psychology of insiders who commit intellectual property theft, noting examples of 'observable workplace risk indicators' and discussing various mitigating strategies, including employee screening and employee reporting programs (2011).…”
Section: Insider Threats and Data Leakagementioning
confidence: 99%
“…Additionally, a 2011 SEI report titled Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination presents an example of an insider threat pattern based on the insight that "many insiders who stole their organization's intellectual property stole at least some of it within 30 days of their termination" [1].…”
Section: Mitigating Insider Threat: Tools and Techniquesmentioning
confidence: 99%