A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …
cybersecurity. This phenomenon indicates that threats require special detection systems …
Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …
Insider threat detection based on user behavior modeling and anomaly detection algorithms
Insider threats are malicious activities by authorized users, such as theft of intellectual
property or security information, fraud, and sabotage. Although the number of insider threats …
property or security information, fraud, and sabotage. Although the number of insider threats …
Enhancing false negative and positive rates for efficient insider threat detection
M AlSlaiman, MI Salman, MM Saleh, B Wang - Computers & Security, 2023 - Elsevier
Insider threats on information security can become a burden for organizations. However,
outsider attacks have received more attention compared to insider attacks. Many …
outsider attacks have received more attention compared to insider attacks. Many …
Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques
Malware analysis is fundamental for defending against prevalent cyber security threats and
requires a means to deploy and study behavioural software traits as more sophisticated …
requires a means to deploy and study behavioural software traits as more sophisticated …
Insider-threat detection using gaussian mixture models and sensitivity profiles
J Happa - Computers & Security, 2018 - Elsevier
The insider threat is one of the most challenging problems to detect due to its complex
nature and significant impact on organisations. Insiders pose a great threat on organisations …
nature and significant impact on organisations. Insiders pose a great threat on organisations …
Evaluating awareness and perception of botnet activity within consumer internet-of-things (IoT) networks
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices,
has led to the production of swathes of insecure Internet-connected devices. Many can be …
has led to the production of swathes of insecure Internet-connected devices. Many can be …
[PDF][PDF] SoK: A Systematic Review of Insider Threat Detection.
Due to the subtle nature of the insider threat, government bodies and corporate
organizations are forced to face the insider threat that is both malicious and accidental. In …
organizations are forced to face the insider threat that is both malicious and accidental. In …
[PDF][PDF] Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics.
Machine Learning coupled with User Behavior Analytics. The framework models the user
behavior as sequences of events representing the user activities at such a network. The …
behavior as sequences of events representing the user activities at such a network. The …
Vasabi: Hierarchical user profiles for interactive visual user behaviour analytics
User behaviour analytics (UBA) systems offer sophisticated models that capture users'
behaviour over time with an aim to identify fraudulent activities that do not match their …
behaviour over time with an aim to identify fraudulent activities that do not match their …