Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour

Article English OPEN
McGough, Andrew Stephen; Arief, Budi; Gamble, Carl; Wall, David; Brennan, John; Fitzgerald, John; van Moorsel, Aad; Alwis, Sujeewa; Theodoropoulos, Georgios; Ruck-Keene, Ed;
(2015)
  • Publisher: Innovative Information Science & Technology Research Group
  • Subject: QA

The insider threat problem is a significant and ever present issue faced by any organisation. While security mechanisms can be put in place to reduce the chances of external agents gaining access to a system, either to steal assets or alter records, the issue is more co... View more
  • References (17)
    17 references, page 1 of 2

    [1] A. S. McGough, D. Wall, J. Brennan, G. Theodoropoulos, E. Ruck-Keene, B. Arief, C. Gamble, J. Fitzgerald, A. van Moorsel, and S. Alwis, “Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware),” in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST'15), Denver, Colorado, USA. ACM, 2015, pp. 1-12. [Online]. Available: http://doi.acm.org/10.1145/2808783.2808785

    [2] E. Cole and S. Ring, Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft: Protecting the Enterprise from Sabotage, Spying, and Theft. Syngress, 2005.

    [3] L. Spitzner, “Honeypots: catching the insider threat,” in Proc. of the 19th Annual Computer Security Applications Conference (ACSAC'03), Las Vegas, Nevada, USA. IEEE, December 2003, pp. 170-179. [Online]. Available: http://dx.doi.org/10.1109/CSAC.2003.1254322

    [4] G. Greenwald, E. MacAskill, and L. Poitras, “Edward snowden: the whistleblower behind the NSA surveillance revelations,” The Guardian, June 2013, http://www.theguardian.com/world/2013/jun/09/ edward-snowden-nsa-whistleblower-surveillance [Online; Accessed on December 10, 2015].

    [5] M. Bishop and C. Gates, “Defining the insider threat,” in Proc. of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead (CSIIRW'08), Oak Ridge, Tennessee, USA. ACM, May 2008, pp. 15:1-15:3. [Online]. Available: http://doi.acm.org/10.1145/1413140.1413158

    [6] K. D. Loch, H. H. Carr, and M. E. Warkentin, “Threats to information systems: Today's reality, yesterday's understanding,” MIS Quarterly, vol. 16, no. 2, pp. 173-186, June 1992.

    [7] D. Wall, “Enemies within: redefining the insider threat in organizational security policy.” Security Journal, vol. 26, no. 2, pp. 107-124, April 2013.

    [8] E. Pauwels and O. Ambekar, “One class classification for anomaly detection: Support vector data description revisited,” in Proc. of the 11th Industrial Conference on Advances in Data Mining. Applications and Theoretical Aspects (ICDM'11), New York, NY, USA, LNCS, P. Perner, Ed., vol. 6870. Springer Berlin Heidelberg, August-September 2011, pp. 25-39. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-23184-1 3

    [9] D. Tax and R. Duin, “Support vector data description,” Machine Learning, vol. 54, no. 1, pp. 45-66, 2004.

    [10] V. N. Vapnik, The Nature of Statistical Learning Theory. New York, NY, USA: Springer-Verlag, 1995.

  • Similar Research Results (1)
    dataset
    Larry Nign, 1957 (2012)
    72%
  • Metrics
Share - Bookmark