A PREDICTIVE USER BEHAVIOUR ANALYTIC MODEL FOR INSIDER THREATS IN CYBERSPACE
Main Article Content
Abstract
Article Details
References
REFERENCES
Akinyemi, B.O., Amoo, O. A., and Olajubu, A. E. (2014). An Adaptive Decision Support Model for Data Communication Network Security Risk Management. International Journal of Computer Applications, Vol. 106, No. 8, pp. 1-7
Akinyemi B.O., Amoo A.O., and Aderounmu G.A. (2015). Performance Prediction Model for Network Security Risk Management. Communications on Applied Electronics (CAE), Vol.2, No.8, pp.1-7, doi: 10.5120/cae2015651816.
Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers and security, Vol. 21. No.6, pp.526-531. DOI: 10.1016/S0167-4048(02)01009-X
Greitzer F.L, Hohimer R.E, (2011). Modeling Human Behavior to Anticipate Insider Attacks. Journal of Strategic Security, Vol. 4, No.2, pp.25–48. DOI: 10.5038/1944-0472.4.2.2
Stolfo, S. J., Bellovin, S. M., Keromytis, A. D., Hershkop, S., and Smith, S. W, Sinclair, S. (2008). Insider attack and cyber security: beyond the hacker, Vol. 39. DOI: 10.1007/978-0-387-77322-3
Caralli, R. A., Allen, J. H., Curtis, P. D., White, D. W., and Young, L. R. (2010), “Improving Operational Resilience Processes: The CERT Resilience Management Model”, in proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom). pp. 1165-1170. doi: 10.1109/SocialCom.2010.173.
Pramanik, A. G., Singh, V., Vig, R., Srivastava, A. K. and Tiwary, D. N. (2004). Estimation of effective porosity using geostatistics and multiattribute transforms: A case study. Geophysics, Vol.69, No. 2, pp.352-372. DOI: 10.1190/1.1707054
Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A. and Srivastava, J. (2003). A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the 2003 SIAM international conference on data mining, pp. 25-36. DOI: 10.1137/1.9781611972733.3
Wood, B. (2000). An insider threat model for adversary simulation. SRI International, Research on Mitigating the Insider Threat to Information Systems, pp. 1-3.
Schoenholtz, A. I., Schrag, P. G. and Ramji-Nogales, J. (2014). Lives in the balance: Asylum adjudication by the department of homeland security. NYU Press.
Shabtai, A., Elovici, Y. and Rokach, L. (2012). A survey of data leakage detection and prevention solutions. Springer Science and Business Media. ISBN: 978-1-4614-2052-1
Sapegin A., Amirkhanyan A., Gawron M., Cheng F., Meinel C. (2015) Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour. In: Boumerdassi S., Bouzefrane S., Renault É. (eds) Mobile, Secure, and Programmable Networking. MSPN 2015. Lecture Notes in Computer Science, Vol. 9395. Springer, Cham. doi:10.1007/978-3-319-25744-0_12
Udoeyop, A., Sheldon, F. and Kirkpatrick, M. (2009). Heuristic identification and tracking of insider threat prospectus. August, 14, 2009.
Alghamdi, G., Laskey, K., Wang, X., Barbara, D., Shackelford, T., Wright, E. and Fitzgerald, J. (2004). Detecting threatening behavior using bayesian networks. In Proceedings of the Conference on Behavioral Representation in Modeling and Simulation, pp. 32-33.
McKinney, S. and Reeves, D. S. (2009). User identification via process profiling. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1-4. Doi:10.1145/1558607.1558666
Wang, H., Liu, S. and Zhang, X. (2006). A prediction model of insider threat based on multi-agent. In 2006 First International Symposium on Pervasive Computing and Applications, pp.273-278. Doi: 10.1109/SPCA.2006.297582
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J. and Zerkle, D. (1996). GrIDS-a graph based intrusion detection system for large networks. In Proceedings of the 19th national information systems security conference, pp.361-370.
Akinyemi B.O; Jekoyemi O.V; Aladesanmi T.A; Aderounmu G.A; and Kamagate B.H (2018). A Scalable Attack Graph Generation for Network Security Management. Journal of Computer Science and Information Technology (JCSIT), Vol.6, No.2, pp.30-44, doi:10.15640/jcsit.v6n2a4.
Gamachchi A., Sun L., and Boztas L. (2017). Graph based framework for malicious insider threat detection. In Proceedings of the 50th Hawaii International Conference of System Science, pp. 2638–2647. Doi: 10.24251/HICSS.2017.319
Szymanski, B. K. and Zhang, Y. (2004). Recursive data mining for masquerade detection and author identification. In Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 424-431. Doi: 10.1109/IAW.2004.1437848
Parveen, P., Mcdaniel, N., Weger, Z., Evans, J., Thuraisingham, B., Hamlen, K. and Khan, L. (2013). Evolving insider threat detection stream mining perspective. International Journal on Artificial Intelligence Tools, Vol.22, No.05, 1360013. Doi: 10.1142/S0218213013600130
Gavai, G.; Sricharan, K.; Gunning, D.; Hanley, J.; Singhal, M.; and Rolleston, R. 2015. Supervised and unsupervised methods to detect insider threat from enterprise social and online activity data. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol.6, No.4, pp.47–63.
Sun, L., Versteeg, S., Boztas, S. and Rao, A. (2016). Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study. arXiv:1609.06676
Ma, W., Sartipi, K. and Bender, D. (2016). Knowledge-driven user behavior pattern discovery for system security enhancement. International Journal of Software Engineering and Knowledge Engineering, Vol.26, No.03, pp.379-404. Doi: 10.1142/S0218194016500169
Xi, X., Zhang, T., Du, D., Zhao, G., Gao, Q., Zhao, W. and Zhang, S. (2018). Method and System for Detecting Anomalous User Behaviors: An Ensemble Approach. In proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering (SEKE), pp. 263-262. Doi: 10.18293/SEKE2018-036
Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N. and Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In Workshops at the Thirty-First AAAI Conference on Artificial Intelligence. arXiv:1710.00811
Yuan F., Cao Y., Shang Y., Liu Y., Tan J., Fang B. (2018) Insider Threat Detection with Deep Neural Network. In: Shi Y. et al. (eds) Computational Science – ICCS 2018. ICCS 2018. Lecture Notes in Computer Science, Vol 10860. Doi: 10.1007/978-3-319-93698-7_4
Matterer J. and Lejeune D. (2018). Peer group metadata-informed LSTM ensembles for insider threat detection. In proceedings of the International Florida Artificial Intelligence Research Society Conference, pp. 62–67.