Validating an insider threat detection system: A real scenario perspective

There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to det...

Celý popis

Podrobná bibliografie
Hlavní autoři: Agrafiotis, I, Erola, A, Happa, J, Goldsmith, M, Creese, S
Médium: Conference item
Vydáno: Institute of Electrical and Electronics Engineers 2016
_version_ 1826296166679052288
author Agrafiotis, I
Erola, A
Happa, J
Goldsmith, M
Creese, S
author_facet Agrafiotis, I
Erola, A
Happa, J
Goldsmith, M
Creese, S
author_sort Agrafiotis, I
collection OXFORD
description There exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection systems to address the problem, but the lack of real data due to privacy and ethical issues remains a significant obstacle for validating and designing effective and scalable systems. In this paper, we present the results and our experiences from applying our detection system into a multinational organisation, the approach followed to abide with the ethical and privacy considerations and the lessons learnt on how the validation process refined the system in terms of effectiveness and scalability.
first_indexed 2024-03-07T04:12:10Z
format Conference item
id oxford-uuid:c82fa5ff-eed3-4d0e-8fbd-5c97de1d1d78
institution University of Oxford
last_indexed 2024-03-07T04:12:10Z
publishDate 2016
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling oxford-uuid:c82fa5ff-eed3-4d0e-8fbd-5c97de1d1d782022-03-27T06:50:27ZValidating an insider threat detection system: A real scenario perspectiveConference itemhttp://purl.org/coar/resource_type/c_5794uuid:c82fa5ff-eed3-4d0e-8fbd-5c97de1d1d78Symplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2016Agrafiotis, IErola, AHappa, JGoldsmith, MCreese, SThere exists unequivocal evidence denoting the dire consequences which organisations and governmental institutions face from insider threats. While the in-depth knowledge of the modus operandi that insiders possess provides ground for more sophisticated attacks, organisations are ill-equipped to detect and prevent these from happening. The research community has provided various models and detection systems to address the problem, but the lack of real data due to privacy and ethical issues remains a significant obstacle for validating and designing effective and scalable systems. In this paper, we present the results and our experiences from applying our detection system into a multinational organisation, the approach followed to abide with the ethical and privacy considerations and the lessons learnt on how the validation process refined the system in terms of effectiveness and scalability.
spellingShingle Agrafiotis, I
Erola, A
Happa, J
Goldsmith, M
Creese, S
Validating an insider threat detection system: A real scenario perspective
title Validating an insider threat detection system: A real scenario perspective
title_full Validating an insider threat detection system: A real scenario perspective
title_fullStr Validating an insider threat detection system: A real scenario perspective
title_full_unstemmed Validating an insider threat detection system: A real scenario perspective
title_short Validating an insider threat detection system: A real scenario perspective
title_sort validating an insider threat detection system a real scenario perspective
work_keys_str_mv AT agrafiotisi validatinganinsiderthreatdetectionsystemarealscenarioperspective
AT erolaa validatinganinsiderthreatdetectionsystemarealscenarioperspective
AT happaj validatinganinsiderthreatdetectionsystemarealscenarioperspective
AT goldsmithm validatinganinsiderthreatdetectionsystemarealscenarioperspective
AT creeses validatinganinsiderthreatdetectionsystemarealscenarioperspective