Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations

Insider threat is a persistent concern for organisations and business alike that has attracted the interest of the research community, resulting in numerous behavioural models and tools to tackle it. However, the effectiveness of detection of these tools has scarcely been demonstrated in real enviro...

Ausführliche Beschreibung

Bibliographische Detailangaben
Hauptverfasser: Erola, A, Agrafiotis, I, Goldsmith, M, Creese, S
Format: Journal article
Sprache:English
Veröffentlicht: Elsevier 2022
_version_ 1826307576457854976
author Erola, A
Agrafiotis, I
Goldsmith, M
Creese, S
author_facet Erola, A
Agrafiotis, I
Goldsmith, M
Creese, S
author_sort Erola, A
collection OXFORD
description Insider threat is a persistent concern for organisations and business alike that has attracted the interest of the research community, resulting in numerous behavioural models and tools to tackle it. However, the effectiveness of detection of these tools has scarcely been demonstrated in real environments. In order to fill this gap, we collaborated with three multinational commercial organisations who trialled our anomaly detection system, and worked with us to understand performance constraints for insider threat detection deployment and innate weaknesses in their operational contexts. During a period longer than a year, we were provided access to real data in their premises and interacted with their cybersecurity analysts to understand their systems, validate the results and identify best practices for mitigating insider threat. In this paper, we provide details on the architecture used in our tool, the methodology followed to validate its performance and we elaborate on our experiences in implementing the tool in the three corporate environments. We present the results obtained from deploying the detection system in real network infrastructure over a period of six months, the lessons learned, issues experienced, and potential limitations.
first_indexed 2024-03-07T07:05:10Z
format Journal article
id oxford-uuid:b5910f40-d623-4a41-b514-00044e64e767
institution University of Oxford
language English
last_indexed 2024-03-07T07:05:10Z
publishDate 2022
publisher Elsevier
record_format dspace
spelling oxford-uuid:b5910f40-d623-4a41-b514-00044e64e7672022-04-22T11:56:53ZInsider-threat detection: Lessons from deploying the CITD tool in three multinational organisationsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:b5910f40-d623-4a41-b514-00044e64e767EnglishSymplectic ElementsElsevier2022Erola, AAgrafiotis, IGoldsmith, MCreese, SInsider threat is a persistent concern for organisations and business alike that has attracted the interest of the research community, resulting in numerous behavioural models and tools to tackle it. However, the effectiveness of detection of these tools has scarcely been demonstrated in real environments. In order to fill this gap, we collaborated with three multinational commercial organisations who trialled our anomaly detection system, and worked with us to understand performance constraints for insider threat detection deployment and innate weaknesses in their operational contexts. During a period longer than a year, we were provided access to real data in their premises and interacted with their cybersecurity analysts to understand their systems, validate the results and identify best practices for mitigating insider threat. In this paper, we provide details on the architecture used in our tool, the methodology followed to validate its performance and we elaborate on our experiences in implementing the tool in the three corporate environments. We present the results obtained from deploying the detection system in real network infrastructure over a period of six months, the lessons learned, issues experienced, and potential limitations.
spellingShingle Erola, A
Agrafiotis, I
Goldsmith, M
Creese, S
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
title Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
title_full Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
title_fullStr Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
title_full_unstemmed Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
title_short Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
title_sort insider threat detection lessons from deploying the citd tool in three multinational organisations
work_keys_str_mv AT erolaa insiderthreatdetectionlessonsfromdeployingthecitdtoolinthreemultinationalorganisations
AT agrafiotisi insiderthreatdetectionlessonsfromdeployingthecitdtoolinthreemultinationalorganisations
AT goldsmithm insiderthreatdetectionlessonsfromdeployingthecitdtoolinthreemultinationalorganisations
AT creeses insiderthreatdetectionlessonsfromdeployingthecitdtoolinthreemultinationalorganisations