A survey of insider attack detection research

MB Salem, S Hershkop, SJ Stolfo - … Attack and Cyber Security: Beyond the …, 2008 - Springer
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …

A framework for understanding and predicting insider attacks

EE Schultz - Computers & security, 2002 - Elsevier
In this paper an insider attack is considered to be deliberate misuse by those who are
authorized to use computers and networks. Applying this definition in real-life settings to …

Detecting anomalous insiders in collaborative information systems

Y Chen, S Nyemba, B Malin - IEEE transactions on dependable …, 2012 - ieeexplore.ieee.org
Collaborative information systems (CISs) are deployed within a diverse array of
environments that manage sensitive information. Current security mechanisms detect insider …

A call for research on home users' information security behaviour

Y Li, M Siponen - 2011 - aisel.aisnet.org
The number of home computer users is increasing faster than ever. Home users' security
should be an important research topic in IS security research, not only from the perspective …

Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

DS Punithavathani, K Sujatha, JM Jain - Cluster Computing, 2015 - Springer
The Insider threat is minimally addressed by current information security practices, yet the
insider poses the most serious threat to organization through various malicious activities …

Understanding insider attack problem and scope in cloud

T Gunasekhar, KT Rao, MT Basu - … International Conference on …, 2015 - ieeexplore.ieee.org
The malicious insider can be an employees, user and/or third party business partner. The
insiders can have legitimate access to their organization data centers. In organizations, the …

Analyzing side channel leakage of masked implementations with stochastic methods

K Lemke-Rust, C Paar - … –ESORICS 2007: 12th European Symposium On …, 2007 - Springer
Side channel cryptanalysis is a collective term for implementation attacks aiming at
recovering secret or private keys from a cryptographic module by observing its physical …

Detecting insider threats using Ben-ware: Beneficial intelligent software for identifying anomalous human behaviour

AS McGough, B Arief, C Gamble, D Wall… - Journal of Wireless …, 2015 - kar.kent.ac.uk
The insider threat problem is a significant and ever present issue faced by any organisation.
While security mechanisms can be put in place to reduce the chances of external agents …

Insider threat simulation and performance analysis of insider detection algorithms with role based models

S Nellikar - 2010 - ideals.illinois.edu
Insider threat problems are widespread in industry today. They have resulted in huge losses
to organizations. The security reports by leading organizations point out the fact that there …

Users' information systems (IS) security behavior in different contexts

Y Li - 2015 - oulurepo.oulu.fi
Users' information systems (IS) security behavior continuously draws attentions from
scholars and practitioners. While previous studies usually focused on one context (eg …