2012 IEEE Symposium on Security and Privacy Workshops 2012
DOI: 10.1109/spw.2012.29
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Insider Threat Detection through Graph Learning and Psychological Context

Abstract: Abstract-The annual incidence of insider attacks continues to grow, and there are indications this trend will continue. While there are a number of existing tools that can accurately identify known attacks, these are reactive (as opposed to proactive) in their enforcement, and may be eluded by previously unseen, adversarial behaviors. This paper proposes an approach that combines Structural Anomaly Detection (SA) from social and information networks and Psychological Profiling (PP) of individuals. SA uses tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(62 citation statements)
references
References 21 publications
0
62
0
Order By: Relevance
“…A copy of the data is transmitted to the ADAMS testbed environment, where it is anonymized by removal or hashing of personally identifying information (PII) and stored in an instance of the SureView warehouse schema. In parallel, the Red Team creates additional SureView events (boxes [4][5] that are inserted into a separate partition for merger with the collected data.…”
Section: A Monthly Pipeline Processing In Testbed Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…A copy of the data is transmitted to the ADAMS testbed environment, where it is anonymized by removal or hashing of personally identifying information (PII) and stored in an instance of the SureView warehouse schema. In parallel, the Red Team creates additional SureView events (boxes [4][5] that are inserted into a separate partition for merger with the collected data.…”
Section: A Monthly Pipeline Processing In Testbed Environmentmentioning
confidence: 99%
“…Understanding the types of attacks designed to steal protected information informs the development of defensive enterprise detection technologies such as decoys ([4], [17]). Understanding complex human behaviors in enterprise environments supports the identification of patterns of activity in computer usage data related to behaviors associated with insider threat actions, such as quitting ( [10], [5]). Characterizing behavior demonstrated by users in online social communities such as deception ( [3]) and negative predisposition toward law enforcement ( [13]) can be relevant to the insider threat domain.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, [8] research is emphasizing that human behavior and personality are important for insider detection, and research on how to improve the accuracy of detection by combining human psychological profile information with detection models is underway.…”
Section: Etcmentioning
confidence: 99%
“…Buford et al [7] use situation-aware multi-agent systems as part of a distributed architecture for insider threat detection. Brdiczka et al [8] combine psychological profiling with structural anomaly detection to develop an architecture for insider-threat detection. Eberle et al [9] consider Graph-Based Anomaly Detection as a tool for detecting insiders, based on modifications, insertions and deletions of activities from the graph.…”
Section: Related Workmentioning
confidence: 99%