A Graph Based Framework for Malicious Insider Threat Detection

09/01/2018
by   Anagi Gamachchi, et al.
0

While most security projects have focused on fending off attacks coming from outside the organizational boundaries, a real threat has arisen from the people who are inside those perimeter protections. Insider threats have shown their power by hugely affecting national security, financial stability, and the privacy of many thousands of people. What is in the news is the tip of the iceberg, with much more going on under the radar, and some threats never being detected. We propose a hybrid framework based on graphical analysis and anomaly detection approaches, to combat this severe cybersecurity threat. Our framework analyzes heterogeneous data in isolating possible malicious users hiding behind others. Empirical results reveal this framework to be effective in distinguishing the majority of users who demonstrate typical behavior from the minority of users who show suspicious behavior.

READ FULL TEXT
research
09/01/2018

Insider Threat Detection Through Attributed Graph Clustering

While most organizations continue to invest in traditional network defen...
research
03/02/2022

Mobile device users' susceptibility to phishing attacks

The mobile device is one of the fasted growing technologies that is wide...
research
03/08/2019

ABC: A Cryptocurrency-Focused Threat Modeling Framework

Cryptocurrencies are an emerging economic force, but there are concerns ...
research
09/25/2018

A Framework for Data-Driven Physical Security and Insider Threat Detection

This paper presents PS0, an ontological framework and a methodology for ...
research
03/06/2022

Hybrid Deep Learning Model using SPCAGAN Augmentation for Insider Threat Analysis

Cyberattacks from within an organization's trusted entities are known as...
research
07/16/2020

A Framework for Threats Analysis Using Software-Defined Networking

The ability to analyze network threats is very important in security res...
research
06/02/2010

Métodos para la Selección y el Ajuste de Características en el Problema de la Detección de Spam

The email is used daily by millions of people to communicate around the ...

Please sign up or login with your details

Forgot password? Click here to reset