Classification of Insider Threat Detection Techniques

@inproceedings{Sanzgiri2016ClassificationOI,
  title={Classification of Insider Threat Detection Techniques},
  author={Ameya Sanzgiri and Dipankar Dasgupta},
  booktitle={CISRC},
  year={2016}
}
Most insider attacks done by people who have the knowledge and technical know-how of launching such attacks. This topic has long been studied and many detection techniques were proposed to deal with insider threats. This short paper summarized and classified insider threat detection techniques based on strategies used for detection. 

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-8 of 8 extracted citations

Selecting a cloud service provider to minimize privacy risks

2017 Annual Reliability and Maintainability Symposium (RAMS) • 2017
View 1 Excerpt

An approach for detecting encrypted insider attacks on OpenFlow SDN Networks

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) • 2016
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis

2014 IEEE Security and Privacy Workshops • 2014
View 4 Excerpts
Highly Influenced

Methods and Metrics for Evaluating Analytic Insider Threat Tools

2013 IEEE Security and Privacy Workshops • 2013
View 4 Excerpts
Highly Influenced

Honeypots: Catching the Insider Threat

ACSAC • 2003
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…