NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST '15)
  2. Detecting Insider Threats: Who Is Winning the Game?
Loading...

Please wait, while we are loading the content...

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware)
Detecting Insider Threats: Who Is Winning the Game?
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games
Cyber Threats to Industrial Control Systems
Detecting Insider Threat from Enterprise Social and Online Activity Data
Secure Power Management Scheme for WSN
Modelling Social-Technical Attacks with Timed Automata
SKETURE: A Sketch-based Packet Analysis Tool
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence
Towards Insider Threat Detection Using Psychophysiological Signals
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector

Similar Documents

...
Detecting insider threats in a real corporate database of computer usage activity

Article

...
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models

Article

...
DTB Project: A Behavioral Model for Detecting Insider Threats

...
Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity

...
Trust Enhanced Security Architecture for Detecting Insider Threats

Article

...
Proactive defense of insider threats through authorization management

Article

...
Towards Formal Analysis of Insider Threats for Auctions

Article

...
Detecting insider threats

Article

...
Detecting insider activity using enhanced directory virtualization

Article

Detecting Insider Threats: Who Is Winning the Game?

Content Provider ACM Digital Library
Author Claycomb, William R.
Abstract Preventing, detecting, and responding to malicious insider activity poses a significant challenge to enterprise and organizational security. Studies continue to show the insider threat problem has not abated, and may be increasing. We could speculate on cause, perhaps looking at workforce demographics, new information sharing technologies, or evolving policies regarding personal devices in the workplace. But regardless of the factors driving this trend, the problem of trusted individuals causing harm to the organization by exploiting authorized access is ancient, and will remain a serious problem ad infinitum. The cycle is familiar to security professionals: attackers determine methods of attack, defenders develop countermeasures, attackers determine new methods of attack, and so on. So where do we stand today? What new capabilities are malicious insiders exploiting, and how are cybersecurity professionals countering those attacks? Is one side significantly "ahead" of the other? In this talk, we'll address those questions, looking at trends in insider attacks and emerging workplace issues that may influence an employee's decision to act maliciously. We'll look at new techniques being published for detecting suspicious activity, including solutions that look for anomalous cyber indicators as well as those that try to identify behavioral concerns among the workforce. We'll highlight barriers to effective insider threat research, such as limited access to real data sets that include ground-truth on insider activity, and share methods for overcoming those challenges. The talk will conclude with a discussion of key areas for future work.
Starting Page 51
Ending Page 51
Page Count 1
File Format PDF
ISBN 9781450338240
DOI 10.1145/2808783.2808794
Language English
Publisher Association for Computing Machinery (ACM)
Publisher Date 2015-10-16
Publisher Place New York
Access Restriction Subscribed
Subject Keyword Insider threat
Content Type Text
Resource Type Article
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...