Filters








7,755 Hits in 4.3 sec

Detecting insider threats in a real corporate database of computer usage activity

Ted E. Senator, Edmond Chow, Irfan Essa, Joshua Jones, Vinay Bettadapura, Duen Horng Chau, Oded Green, Oguz Kaya, Anita Zakrzewska, Erica Briscoe, Rudolph IV L. Mappus, Henry G. Goldberg (+22 others)
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fqqihtxlu5bvfaqxjyvqcob35a" style="color: black;">Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD &#39;13</a> </i> &nbsp;
Our system combines structural and semantic information from a real corporate database of monitored activity on their users' computers to detect independently developed red team inserts of malicious insider  ...  We have also developed a visual language for specifying combinations of features, baselines, peer groups, time periods, and algorithms to detect anomalies suggestive of instances of insider threat behavior  ...  To evaluate the feasibility of automated detection of ITs from computer usage data, Defense Advanced Research Project's Anomaly Detection at Multiple Scales (ADAMS) program [6] has collected a database  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2487575.2488213">doi:10.1145/2487575.2488213</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13.html">dblp:conf/kdd/SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/byb6q65tlfgntczndcx2fhzpom">fatcat:byb6q65tlfgntczndcx2fhzpom</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812125611/https://www.cc.gatech.edu/fac/bader/papers/PRODIGAL-KDD2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/4f/914f8fe331c8e125daaaf55855d06609dbb990fd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2487575.2488213"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A comparison study of user behavior on Facebook and Gmail

Jianqiang Shen, Oliver Brdiczka, Yiye Ruan
<span title="">2013</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gnyu7gblgjdrzfweisztacq3ni" style="color: black;">Computers in Human Behavior</a> </i> &nbsp;
to detecting aspects of malicious insider activity: a) psychological profiling from email; b) quitting dynamics and quitting prediction from corporate social media data; and c) detecting unusual and anomalous  ...  Table of Contents (None) (3) List of Appendixes: • Detecting insider threat from enterprise social and online activity data • Temporally Coherent Role-Topic Models (TCRTM): deinterlacing overlapping activity  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.chb.2013.06.043">doi:10.1016/j.chb.2013.06.043</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3rw45gizszfp7enk53aidkuwua">fatcat:3rw45gizszfp7enk53aidkuwua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200325234034/https://apps.dtic.mil/dtic/tr/fulltext/u2/a625123.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/22/a0/22a0b8e087fbf4c7460c8c284c2758e24ff890b6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.chb.2013.06.043"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Use of Domain Knowledge to Detect Insider Threats in Computer Activities

William T. Young, Henry G. Goldberg, Alex Memory, James F. Sartain, Ted E. Senator
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/inod5dqjxfdj3bnjykkklcg7d4" style="color: black;">2013 IEEE Security and Privacy Workshops</a> </i> &nbsp;
This paper reports the first set of results from a comprehensive set of experiments to detect realistic insider threat instances in a real corporate database of computer usage activity.  ...  Domain knowledge is applied (1) to select appropriate features for use by structural anomaly detection algorithms, (2) to identify features indicative of activity known to be associated with insider threat  ...  To our knowledge, this is the first set of results from a comprehensive set of experiments to detect realistic IT instances in a real corporate database of computer usage activity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/spw.2013.32">doi:10.1109/spw.2013.32</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sp/YoungGMSS13.html">dblp:conf/sp/YoungGMSS13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cuwgs3qfujdgppjqrhzqa3wlri">fatcat:cuwgs3qfujdgppjqrhzqa3wlri</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170818142910/https://www.computer.org/csdl/proceedings/spw/2013/5017/00/5017a060.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/35/6c352f6775704dbb82a3cf73d207ebca30131276.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/spw.2013.32"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese
<span title="">2017</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hgg5pl76svbjtlbsafmrhnm24i" style="color: black;">IEEE Systems Journal</a> </i> &nbsp;
In this paper, we describe an automated system that is capable of detecting insider threats within an organization.  ...  Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats.  ...  ACKNOWLEDGMENT This research was conducted in the context of a collaborative project on Corporate Insider Threat Detection, sponsored by the U.K.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsyst.2015.2438442">doi:10.1109/jsyst.2015.2438442</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v4r7pihronfqfcz43heehfsjyi">fatcat:v4r7pihronfqfcz43heehfsjyi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721034056/https://ueaeprints.uea.ac.uk/66157/1/Accepted_manuscript.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/e9/dbe9b47a4bdc44883173a955dfbac4f2250f8953.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsyst.2015.2438442"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information

Denys A. Flores, Farrukh Qazi, Arshad Jhumka
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yaqmt4o5gzav5ivi6pnbkjqdui" style="color: black;">2016 IEEE Trustcom/BigDataSE/ISPA</a> </i> &nbsp;
ACKNOWLEDGEMENTS The current research has been sponsored by the Secretariat of Higher Education, Science, Technology and Innovation (SENESCYT) of the Republic of Ecuador.  ...  Actually, insider and outsider malicious activity against Interactions amongst BYOD Threats that may lead to information contamination corporate data was already reported back in 1975 [31] , where computer  ...  For this analysis, relevant research literature and security reports have been considered so that the proposed Threat Model can be used for a better understanding of real world BYOD cases in which corporate  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom.2016.0169">doi:10.1109/trustcom.2016.0169</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/trustcom/FloresQJ16.html">dblp:conf/trustcom/FloresQJ16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ir3j54ny2vdtvnmlz426gnxsgy">fatcat:ir3j54ny2vdtvnmlz426gnxsgy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722155302/http://wrap.warwick.ac.uk/88165/1/WRAP-Bring-disclosure-corporate-Flores-2017.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/80/c080b27db064481c8e18524766b7f6d1e65d7968.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom.2016.0169"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

New Frontiers of Network Security: The Threat Within

Sugata Sanyal, Ajit Shelat, Amit Gupta
<span title="">2010</span> <i title="IEEE"> 2010 Second Vaagdevi International Conference on Information Technology for Real World Problems </i> &nbsp;
Nearly 70% of information security threats originate from inside the organization.  ...  The net result is losses worth millions of dollars in terms of IP theft, leakage of customer / individual information, etc.  ...  , and for activities not in line of their business requirements.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/vcon.2010.19">doi:10.1109/vcon.2010.19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h6xutl6fmnhz5ga3ws34ovadai">fatcat:h6xutl6fmnhz5ga3ws34ovadai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705131452/http://www.tifr.res.in/~sanyal/papers/New_frontiers_in_Network_Security_Threats_Within.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/e6/01e65f87d7899e2d1aa0a07f5453b4edf5efe2c3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/vcon.2010.19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

New Frontiers of Network Security: The Threat Within [article]

Sugata Sanyal, Ajit Shelat, Amit Gupta
<span title="2010-10-13">2010</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Nearly 70% of information security threats originate from inside an organization.  ...  The net result is losses worth millions of dollars in terms of IP theft, leakage of customer / individual information, etc.  ...  CONCLUSIONS With changes in technology landscape the insider threats are rising at an alarming rate. Most of insider threats are far more sophisticated and are difficult to catch.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1010.1938v2">arXiv:1010.1938v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uc6xskcbrfgldnuqstry25cini">fatcat:uc6xskcbrfgldnuqstry25cini</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200903092219/https://arxiv.org/vc/arxiv/papers/1010/1010.1938v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/86/2f86c9da4bad2515959959b31d7ecc19daa579ad.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1010.1938v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

SoK: A Systematic Review of Insider Threat Detection

Aram Kim, Junhyoung Oh, Jinho Ryu, Jemin Lee, Kookheui Kwon, Kyungho Lee
<span title="">2019</span> <i title="JoWUA"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wzskw2gcnneepegdm5qqr4h3qu" style="color: black;">Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications</a> </i> &nbsp;
In this paper, we provide a systematic understanding of the past literature that addresses the issues with insider threat detection. Our review consists of three items.  ...  First, we examine the different types of insider threats based on insider characteristics and insider activities.  ...  [31] proposed a model consisting of Psychological Profiling and Real-Time Usage Profiling.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22667/jowua.2019.12.31.046">doi:10.22667/jowua.2019.12.31.046</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/jowua/KimORLKL19.html">dblp:journals/jowua/KimORLKL19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qdw2eruvijhdjc3qsiit6yblda">fatcat:qdw2eruvijhdjc3qsiit6yblda</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210102064446/http://isyou.info/jowua/papers/jowua-v10n4-4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/c3/ccc3efc8cae97a0db216cfce58bb51e0d5dcb31f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22667/jowua.2019.12.31.046"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese
<span title="">2013</span> <i title="JoWUA"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wzskw2gcnneepegdm5qqr4h3qu" style="color: black;">Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications</a> </i> &nbsp;
The insider threat faced by corporations and governments today is a real and significant problem, and one that has become increasingly difficult to combat as the years have progressed.  ...  In this paper, we propose a framework for modelling the insider-threat problem that goes beyond traditional technological observations and incorporates a more complete view of insider threats, common precursors  ...  Acknowledgements This research was conducted in the context of a collaborative project on Corporate Insider Threat Detection, sponsored by the UK National Cyber Security Programme in conjunction with the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22667/jowua.2013.12.31.020">doi:10.22667/jowua.2013.12.31.020</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/jowua/LeggMNHAGC13.html">dblp:journals/jowua/LeggMNHAGC13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/toiluvhzqfeh7o3cgotlqyansq">fatcat:toiluvhzqfeh7o3cgotlqyansq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201230021210/http://isyou.info/jowua/papers/jowua-v4n4-2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/16/dc16c5282c8548edeb201484afd4c722fabab493.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22667/jowua.2013.12.31.020"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Visualizing the insider threat: challenges and tools for identifying malicious user activity

Philip A. Legg
<span title="2015-10-25">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4acxmhgjp5ba7ahm7hpcb5rzvu" style="color: black;">2015 IEEE Symposium on Visualization for Cyber Security (VizSec)</a> </i> &nbsp;
They use a real corporate database, gather as part of the Anomaly Detection at Multiple Scales (ADAMS) program, however due to confidentiality they can not disclose the full details and so it is difficult  ...  In this paper, we propose a visual analytics approach to insider threat detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/vizsec.2015.7312772">doi:10.1109/vizsec.2015.7312772</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/vizsec/Legg15.html">dblp:conf/vizsec/Legg15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gdpqm3pghbbu3hc5jwgdimgxqy">fatcat:gdpqm3pghbbu3hc5jwgdimgxqy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721032052/http://eprints.uwe.ac.uk/27441/1/2015-VizSec_preprint.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e9/02/e90213403f270ac7466558001d447b7c3eae684d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/vizsec.2015.7312772"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Insider Threat Prediction Tool: Evaluating the probability of IT misuse

G.B Magklaras, S.M Furnell
<span title="">2001</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/e25s2ofdbnfb3j2rstrnkqsqfi" style="color: black;">Computers &amp; security</a> </i> &nbsp;
The proposed solution estimates the level of threat that is likely to originate from a particular insider by introducing a threat evaluation system based on certain profiles of user behaviour.  ...  However, a substantial amount of work is required, in order to materialize and validate the proposed solutions.  ...  inside a corporate infrastructure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s0167-4048(02)00109-8">doi:10.1016/s0167-4048(02)00109-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/56uhzhxt6jggpoa3gcrfk574c4">fatcat:56uhzhxt6jggpoa3gcrfk574c4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808151205/http://folk.uio.no/georgios/papers/magklarasfurnellinsiderthreat.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/30/42/30425209a6d0da35e5ac4b8e73657805c66025d7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s0167-4048(02)00109-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

From Logs to Logic: Best Practices for Security Information Management

Gretchen Hellman
<span title="">2006</span> <i title="Informa UK Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/o64kcoaixbgpnlghum4okekhny" style="color: black;">EDPACS: The EDP Audit, Control, and Security Newsletter</a> </i> &nbsp;
of true threats and compliance issues in a business relevant context.  ...  With so many event logs generated each day, identifying perimeter security, insider threat and compliance issues within this sea of information can be an impossible task.  ...  In addition, it is important to recognize insider activity if it is at an uncommon or suspicious time of usage.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/1079.07366981/46050.33.12.20060601/93398.1">doi:10.1201/1079.07366981/46050.33.12.20060601/93398.1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/anfykdpw5nhzrmzuycofqok5o4">fatcat:anfykdpw5nhzrmzuycofqok5o4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060323093424/http://arc51ght.temp.veriohosting.com/articles/From%20Logs%20to%20Logic.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/fc/fefcc8c00ffb64887b8400ef4a5a53efed9847d9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/1079.07366981/46050.33.12.20060601/93398.1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Characterizing Network Intrusion Prevention System

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
<span title="2011-01-12">2011</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
An IPS can be defined as an in-line product that focuses on identifying and blocking malicious network activity in real time [4] .  ...  However, the primary intrusion prevention use signature mechanism to identify activity in network traffic and host where perform detect on inboundoutbound packets and would be to block that activity before  ...  We observe that the accuracy affects the correctness of deciding whether an attack exists in real-traffic, notifying the logging system of an attack based on the list in the database.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/1811-2439">doi:10.5120/1811-2439</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pirx3fj76faibm3anbzmhdkx6e">fatcat:pirx3fj76faibm3anbzmhdkx6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813181045/http://www.ijcaonline.org/volume14/number1/pxc3872439.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/11/b611789aa991dbf4d0dc6f3ff4644dd71a25213a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/1811-2439"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

Farhan Hyder, Wolfgang Slany
<span title="">2013</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
However, when considering cloud computing, government entities must address a host of security issues (such as malicious insiders) beyond those of service cost and flexibility.  ...  The scope and objective of this paper is to analyze, evaluate and investigate the insider threat in cloud security in sensitive infrastructures as well as to propose two proactive socio-technical solutions  ...  This database would work on cases of insider activity from the real world documented with many insider threat cases that may provide a rich source for empirical research on real cases of insider threat  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2013.040502">doi:10.14569/ijacsa.2013.040502</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lwe2otxx3jh2zk6ly7hicozgpa">fatcat:lwe2otxx3jh2zk6ly7hicozgpa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130924135932/http://thesai.org/Downloads/Volume4No5/Paper_2-Advanced_Personnel_Vetting_Techniques_in_Critical_Multi-Tennant_Hosted_Computing_Environments.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/56/8756afb0066790217ca1704bfe1f956268c9d4a9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2013.040502"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses

Neetesh Saxena, Emma Hayes, Elisa Bertino, Patrick Ojo, Kim-Kwang Raymond Choo, Pete Burnap
<span title="2020-09-07">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ikdpfme5h5egvnwtvvtjrnntyy" style="color: black;">Electronics</a> </i> &nbsp;
In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nation's  ...  The insider threat has consistently been identified as a key threat to organizations and governments.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics9091460">doi:10.3390/electronics9091460</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a3krdj2yavdarop7pxpzklogga">fatcat:a3krdj2yavdarop7pxpzklogga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200917005647/https://res.mdpi.com/d_attachment/electronics/electronics-09-01460/article_deploy/electronics-09-01460.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/6e/e76ea7208c292ff42dc8dc6e4a707350a6e120bf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/electronics9091460"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 7,755 results