Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges

S Asha, D Shanmugapriya - Future Generation Computer Systems, 2024 - Elsevier
In cybersecurity, one of the most significant challenges is an insider threat, in which existing
researchers must provide an extensive solution aiming at an enhanced security network …

Twos: A dataset of malicious insider threat behavior based on a gamified competition

A Harilal, F Toffalini, J Castellanos, J Guarnizo… - Proceedings of the …, 2017 - dl.acm.org
In this paper we present the design and outcome of a gamified competition that was devised
in order to obtain a dataset containing realistic instances of insider threats. The competition …

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection

C Song, L Ma, J Zheng, J Liao, H Kuang… - arxiv preprint arxiv …, 2024 - arxiv.org
Log-based insider threat detection (ITD) detects malicious user activities by auditing log
entries. Recently, large language models (LLMs) with strong common sense knowledge …

[PDF][PDF] The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.

A Harilal, F Toffalini, I Homoliak… - J. Wirel. Mob …, 2018 - researchgate.net
In this paper we present open research questions and options for data analysis of our
previously designed dataset called TWOS: The Wolf of SUTD. In specified research …

[HTML][HTML] Insider threat detection based on deep clustering of multi-source behavioral events

J Wang, Q Sun, C Zhou - Applied Sciences, 2023 - mdpi.com
With the continuous advancement of enterprise digitization, insider threats have become
one of the primary cybersecurity concerns for organizations. Therefore, it is of great …

Correlation‐based sequence alignment models for detecting masquerades in cloud computing

HA Kholidy - IET Information Security, 2020 - Wiley Online Library
Despite the important benefits that cloud computing could offer, security remains one of the
major concern that is hindering the development of this paradigm. Masquerades attacks and …

Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection

JB Camiña, MA Medina-Pérez, R Monroy… - Machine vision and …, 2019 - Springer
Dependence on personal computers has required the development of security mechanisms
to protect the information stored in these devices. There have been different approaches to …

Obfuscation of malicious behaviors for thwarting masquerade detection systems based on locality features

J Maestre Vidal, MA Sotelo Monge - Sensors, 2020 - mdpi.com
In recent years, dynamic user verification has become one of the basic pillars for insider
threat detection. From these threats, the research presented in this paper focuses on …

Detection of insider threats using deep learning: a review

P Lavanya, VS Shankar Sriram - … in Data Mining: Proceedings of ICCIDM …, 2022 - Springer
Massive number of cyberattacks exist on the Internet, among which insider threat is one of
the most challenging malicious threats in cyberspace. The identification of insiders …