Security

Specializing Network Analysis to Detect Anomalous Insider Actions

Download Now Free registration required

Executive Summary

Collaborative Information Systems (CIS) enable users to coordinate efficiently over shared tasks in complex distributed environments. For flexibility, they provide users with broad access privileges, which, as a side-effect, leave such systems vulnerable to various attacks. Some of the more damaging malicious activities stem from internal misuse, where users are authorized to access system resources. A promising class of insider threat detection models for CIS focuses on mining access patterns from audit logs, however, current models are limited in that they assume organizations have significant resources to generate label cases for training classifiers or assume the user has committed a large number of actions that deviate from "Normal" behavior.

  • Format: PDF
  • Size: 3089.6 KB