Using PLSI-U to Detect Insider Threats from Email Traffic
نویسندگان
چکیده
منابع مشابه
Using PLSI-U to detect insider threats by datamining e-mail
Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an approach to assist investigators in identifying potential insider threats. We discern employees interests from e-mail using an extended version of PLSI. These interests are transformed into implicit and explicit social network graphs, which are use...
متن کاملUsing Author Topic to Detect Insider Threats from Email Traffic
Despite a technology bias which focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. One means of preventing insider theft is by stopping potential insiders from becoming actual thieves. In most cases, individuals do not begin work at an organization with the intent of doing harm. Instead, over time something changes resulting in ...
متن کاملUsing Internet Activity Profiling for Insider-threat Detection
The insider-threat problem continues to be a major risk to both public and private sectors, where those people who have privileged knowledge and access choose to abuse this in some way to cause harm towards their organisation. To combat against this, organisations are beginning to invest heavily in deterrence monitoring tools to observe employees’ activity, such as computer access, Internet bro...
متن کاملA Probabilistic Analysis Framework for Malicious Insider Threats
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider threats, based on probabilistic modelling, verification, and synthesis techniques. The framework fi...
متن کاملAn insider misuse threat detection and prediction language
An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006