The threat that malicious insiders pose towards organisations is a significant problem. In this paper, we investigate the task of detecting such insiders through a novel method of modelling a user's normal behaviour in order to detect anomalies in that behaviour which may be indicative of an attack. Specifically, we make use of Hidden Markov Models to learn what constitutes normal behaviour, and then use them to detect significant deviations from that behaviour. Our results show that this approach is indeed successful at detecting insider threats, and in particular is able to accurately learn a user's behaviour. These initial tests improve on existing research and may provide a useful approach in addressing this part of the insider-threat c...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Malicious insiders increasingly affect organizations by leaking classified data to unautho- rized en...
Malicious insiders increasingly affect organizations by leaking classified data to unautho- rized en...
The threat that malicious insiders pose towards organisations is a significant problem. In this pape...
The threat that malicious insiders pose towards organisations is a significant problem. In this pape...
The insider threat faced by corporations and governments today is a real and significant problem, an...
In order to detect malicious insider attacks it is important to model and analyse infrastructures an...
The insider threat problem is a significant and ever present issue faced by any organisation. While ...
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining be...
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining be...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The greatest asset that any organisation has are its people, but they may also be the greatest threa...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Malicious insiders increasingly affect organizations by leaking classified data to unautho- rized en...
Malicious insiders increasingly affect organizations by leaking classified data to unautho- rized en...
The threat that malicious insiders pose towards organisations is a significant problem. In this pape...
The threat that malicious insiders pose towards organisations is a significant problem. In this pape...
The insider threat faced by corporations and governments today is a real and significant problem, an...
In order to detect malicious insider attacks it is important to model and analyse infrastructures an...
The insider threat problem is a significant and ever present issue faced by any organisation. While ...
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining be...
Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining be...
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, ha...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The greatest asset that any organisation has are its people, but they may also be the greatest threa...
The threat that insiders pose to businesses, institutions and governmental organisations continues t...
The insider threat faced by corporations and governments today is a real and significant problem, an...
Malicious insiders increasingly affect organizations by leaking classified data to unautho- rized en...
Malicious insiders increasingly affect organizations by leaking classified data to unautho- rized en...