Insider Threat Identification by Process Analysis

IEEE Symposium on Security and Privacy Workshops, pp. 251-264, 2014.

Cited by: 38|Bibtex|Views12|DOI:https://doi.org/10.1109/SPW.2014.40
EI
Other Links: dl.acm.org|dblp.uni-trier.de|academic.microsoft.com

Abstract:

The insider threat is one of the most pernicious in computer security. Traditional approaches typically instrument systems with decoys or intrusion detection mechanisms to detect individuals who abuse their privileges (the quintessential \"insider\"). Such an attack requires that these agents have access to resources or data in order to c...More

Code:

Data:

Your rating :
0

 

Tags
Comments