Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics 2011
DOI: 10.1109/isi.2011.5984061
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging social networks to detect anomalous insider actions in collaborative environments

Abstract: Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks. T hey are often deployed in complex dynamic systems that provide users with broad access privileges, but also leave the system vulnerable to various attacks. Techniques to detect threats originating from beyond the system are relatively mature, but methods to detect insider threats are still evolving. A promising class of insider threat detection models for CIS focus on the communities that manifest between users … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…Note that some of the patterns found in Wikipedia are short-lived and have big-network-span (1,2,3,4,6,7,9), while others affect smaller portion of the network, but extend in a longer time period (5,8,10). If we use anomaly detection methods based on single edge/node analysis, we will not discover the full range of patterns and many of the events reported in Table 3 will be missed.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Note that some of the patterns found in Wikipedia are short-lived and have big-network-span (1,2,3,4,6,7,9), while others affect smaller portion of the network, but extend in a longer time period (5,8,10). If we use anomaly detection methods based on single edge/node analysis, we will not discover the full range of patterns and many of the events reported in Table 3 will be missed.…”
Section: Resultsmentioning
confidence: 99%
“…This includes algorithms to detect unusual behavior in social, email and phone call networks [8,12,13], computer network traffic [14,17,32], smart grid sensor data [6] and water distribution networks [19]. Most of these approaches focus on link and node behavior anomalies [2,5,18,27,28,9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is because the current set of approaches tend to assume that either training information is available to build robust classifiers or that the user has committed a large number of actions that deviate from “normal” behavior. Given these limitations, the main contributions of this paper, which is an extension of [28], are as follow:…”
Section: Introductionmentioning
confidence: 99%
“…Our model then assesses if the similarity of the network with and without the user are significantly different. In contrast to [28], we provide justification for certain modeling decisions and the similarity measures employed.…”
Section: Introductionmentioning
confidence: 99%