Validating an insider threat detection system: A real scenario perspective
There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to det...
Hlavní autoři: | , , , , |
---|---|
Médium: | Conference item |
Vydáno: |
Institute of Electrical and Electronics Engineers
2016
|
_version_ | 1826296166679052288 |
---|---|
author | Agrafiotis, I Erola, A Happa, J Goldsmith, M Creese, S |
author_facet | Agrafiotis, I Erola, A Happa, J Goldsmith, M Creese, S |
author_sort | Agrafiotis, I |
collection | OXFORD |
description | There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection systems to address the problem, but the lack of real data due to privacy and ethical issues remains a significant obstacle for validating and designing effective and scalable systems. In this paper, we present the results and our experiences from applying our detection system into a multinational organisation, the approach followed to abide with the ethical and privacy considerations and the lessons learnt on how the validation process refined the system in terms of effectiveness and scalability. |
first_indexed | 2024-03-07T04:12:10Z |
format | Conference item |
id | oxford-uuid:c82fa5ff-eed3-4d0e-8fbd-5c97de1d1d78 |
institution | University of Oxford |
last_indexed | 2024-03-07T04:12:10Z |
publishDate | 2016 |
publisher | Institute of Electrical and Electronics Engineers |
record_format | dspace |
spelling | oxford-uuid:c82fa5ff-eed3-4d0e-8fbd-5c97de1d1d782022-03-27T06:50:27ZValidating an insider threat detection system: A real scenario perspectiveConference itemhttp://purl.org/coar/resource_type/c_5794uuid:c82fa5ff-eed3-4d0e-8fbd-5c97de1d1d78Symplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2016Agrafiotis, IErola, AHappa, JGoldsmith, MCreese, SThere exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection systems to address the problem, but the lack of real data due to privacy and ethical issues remains a significant obstacle for validating and designing effective and scalable systems. In this paper, we present the results and our experiences from applying our detection system into a multinational organisation, the approach followed to abide with the ethical and privacy considerations and the lessons learnt on how the validation process refined the system in terms of effectiveness and scalability. |
spellingShingle | Agrafiotis, I Erola, A Happa, J Goldsmith, M Creese, S Validating an insider threat detection system: A real scenario perspective |
title | Validating an insider threat detection system: A real scenario perspective |
title_full | Validating an insider threat detection system: A real scenario perspective |
title_fullStr | Validating an insider threat detection system: A real scenario perspective |
title_full_unstemmed | Validating an insider threat detection system: A real scenario perspective |
title_short | Validating an insider threat detection system: A real scenario perspective |
title_sort | validating an insider threat detection system a real scenario perspective |
work_keys_str_mv | AT agrafiotisi validatinganinsiderthreatdetectionsystemarealscenarioperspective AT erolaa validatinganinsiderthreatdetectionsystemarealscenarioperspective AT happaj validatinganinsiderthreatdetectionsystemarealscenarioperspective AT goldsmithm validatinganinsiderthreatdetectionsystemarealscenarioperspective AT creeses validatinganinsiderthreatdetectionsystemarealscenarioperspective |