skip to main content
survey

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Published:02 April 2019Publication History
Skip Abstract Section

Abstract

Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel categorization of research that contribute to the organization and disambiguation of insider threat incidents and the defense solutions used against them. The objective of our categorization is to systematize knowledge in insider threat research while using an existing grounded theory method for rigorous literature review. The proposed categorization depicts the workflow among particular categories that include incidents and datasets, analysis of incidents, simulations, and defense solutions. Special attention is paid to the definitions and taxonomies of the insider threat; we present a structural taxonomy of insider threat incidents that is based on existing taxonomies and the 5W1H questions of the information gathering problem. Our survey will enhance researchers’ efforts in the domain of insider threat because it provides (1) a novel structural taxonomy that contributes to orthogonal classification of incidents and defining the scope of defense solutions employed against them, (2) an overview on publicly available datasets that can be used to test new detection solutions against other works, (3) references of existing case studies and frameworks modeling insiders’ behaviors for the purpose of reviewing defense solutions or extending their coverage, and (4) a discussion of existing trends and further research directions that can be used for reasoning in the insider threat domain.

Skip Supplemental Material Section

Supplemental Material

References

  1. A. Abdallah, M. A. Maarof, and A. Zainal. 2016. Fraud detection system: A survey. Journal of Network and Computer Applications 68 (2016), 90--113. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Achleitner, T. La Porta, P. McDaniel, S. Sugrim, S. V. Krishnamurthy, and R. Chadha. 2016. Cyber deception: Virtual networks to defend insider reconnaissance. In Proceedings of the International Workshop on Managing Insider Security Threats. ACM, New York, NY, 57--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Agrafiotis, A. Erola, M. Goldsmith, and S. Creese. 2016. A tripwire grammar for insider threat detection. In Proceedings of the International Workshop on Managing Insider Security Threats. ACM, New York, NY, 105--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Aleman-Meza, P. Burns, M. Eavenson, D. Palaniswami, and A. Sheth. 2005. An ontological approach to the document access problem of insider threat. In Proceedings of the International Conference on Intelligence and Security Informatics. 486--491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. AlGhamdi, K. B. Laskey, E. J. Wright, D. Barbará, and K. Chang. 2006. Modeling insider behavior using multi-entity Bayesian networks. In Proceedings of the International Command and Control Research and Technology Symposium.Google ScholarGoogle Scholar
  6. G. Ali, N. A. Shaikh, and Z. A. Shaikh. 2008. Towards an automated multiagent system to monitor user activities against insider threat. In Proceedings of the International Symposium on Biometrics and Security Technologies. IEEE, Los Alamitos, CA, 1--5.Google ScholarGoogle Scholar
  7. S. Alneyadi, E. Sithirasenan, and V. Muthukkumarasamy. 2016. A survey on data leakage prevention systems. Journal of Network and Computer Applications 62 (2016), 137--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Q. Althebyan and B. Panda. 2007. A knowledge-base model for insider threat prediction. In Proceedings of the Information Assurance and Security Workshop (IAW’07). IEEE, Los Alamitos, CA, 239--246.Google ScholarGoogle Scholar
  9. Q. Althebyan and B. Panda. 2008. Performance analysis of an insider threat mitigation model. In Proceedings of the International Conference on Digital Information Management. IEEE, Los Alamitos, CA, 703--709.Google ScholarGoogle Scholar
  10. M. L. Ambrose, M. A. Seabright, and M. Schminke. 2002. Sabotage in the workplace: The role of organizational injustice. Organizational Behavior and Human Decision Processes 89, 1 (2002), 947--965.Google ScholarGoogle ScholarCross RefCross Ref
  11. D. F. Andersen, D. Cappelli, J. J. Gonzalez, M. Mojtahedzadeh, A. Moore, E. Rich, et al. 2004. Preliminary system dynamics maps of the insider cyber-threat problem. In Proceedings of the International Conference of the System Dynamics Society. 25--29.Google ScholarGoogle Scholar
  12. J. P. Anderson. 1980. Computer Security Threat Monitoring and Surveillance. Technical Report. James P. Anderson Company.Google ScholarGoogle Scholar
  13. E. T. Axelrad, P. J. Sticha, O. Brdiczka, and J. Shen. 2013. A Bayesian network model for predicting insider threats. In Proceedings of the Scurity and Privacy Workshops. IEEE, Los Alamitos, CA, 82--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Azaria, A. Richardson, S. Kraus, and V. S. Subrahmanian. 2014. Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data. Transactions on Computational Social Systems 1, 2 (2014), 135--155.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. R. Band, D. M. Cappelli, L. F. Fischer, A. P. Moore, E. D. Shaw, and R. F. Trzeciak. 2006. Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis. Technical Report. DTIC Document.Google ScholarGoogle Scholar
  16. J. Banks. 1998. Handbook of Simulation: Principles, Methodology, Advances, Applications, and Practice. John Wiley 8 Sons.Google ScholarGoogle Scholar
  17. N. Baracaldo and J. Joshi. 2012. A trust-and-risk aware RBAC framework: Tackling insider threat. In Proceedings of the Symposium on Access Control Models and Technologies. ACM, New York, NY, 167--176. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. M. Bellovin. 2008. The insider attack problem nature and scope. In Insider Attack and Cyber Security. Advances in Information Security, Vol. 39. Springer, 1--4.Google ScholarGoogle Scholar
  19. M. Bertacchini and P. Fierens. 2008. A survey on masquerader detection approaches. In Congreso Iberoamericano de Seguridad Informática, Universidad de la República de Uruguay. 46--60.Google ScholarGoogle Scholar
  20. E. Bertino and G. Ghinita. 2011. Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper. In Proceedings of the Symposium on Information, Computer, and Communications Security. ACM, New York, NY, 10--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. Bhilare, A. Ramani, and S. Tanwani. 2009. Protecting intellectual property and sensitive information in academic campuses from trusted insiders: Leveraging active directory. In Proceedings of the SIGUCCS Fall Conference. ACM, New York, NY, 99--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Bishop. 2005. Position: Insider is relative. In Proceedings of the Workshop on New Security Paradigms. ACM, New York, NY, 77--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Bishop, H. M. Conboy, H. Phan, B. I. Simidchieva, G. S. Avrunin, L. A. Clarke, et al. 2014. Insider threat identification by process analysis. In Proceedings of the Security and Privacy Workshops. IEEE, Los Alamitos, CA, 251--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates. 2008. We have met the enemy and he is us. In Proceedings of the Workshop on New Security Paradigms. ACM, New York, NY, 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Bishop, S. Engle, S. Peisert, S. Whalen, and C. Gates. 2009. Case studies of an insider framework. In Proceedings of the Hawaii International Conference on System Sciences. IEEE, Los Alamitos, CA, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Bishop and C. Gates. 2008. Defining the insider threat. In Proceedings of the Workshop on Cyber Security and Information Intelligence Research. ACM, New York, NY, 15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. C. Brackney and R. H. Anderson. 2004. Workshop on Understanding the Insider Threat. Technical Report. RAND Corporation.Google ScholarGoogle Scholar
  28. O. Brdiczka, J. Liu, B. Price, J. Shen, A. Patil, R. Chow, et al. 2012. Proactive insider threat detection through graph learning and psychological context. In Proceedings of the Security and Privacy Workshops. 142--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. F. Buford, L. Lewis, and G. Jakobson. 2008. Insider threat detection using situation-aware MAS. In Proceedings of the International Conference on Information Fusion. IEEE, Los Alamitos, CA, 1--8.Google ScholarGoogle Scholar
  30. CALO Project. 2015. Enron Email Dataset. Retrieved February 7, 2019 from http://www.cs.cmu.edu/∼enron/.Google ScholarGoogle Scholar
  31. B. Camiña, C. Hernández-Gracidas, R. Monroy, and L. Trejo. 2014. The Windows-Users and Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms. Expert Systems With Applications 41, 3 (2014), 919--930. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. B. Camiña, R. Monroy, L. A. Trejo, and M. A. Medina-Pérez. 2016. Temporal and spatial locality: An abstraction for masquerade detection. IEEE Transactions on Information Forensics and Security 11, 9 (2016), 2036--2051. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. B. Camiña, R. Monroy, L. A. Trejo, and E. Sánchez. 2011. Towards building a masquerade detection method based on user file system navigation. In Proceedings of the Mexican International Conference on Artificial Intelligence. 174--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. D. M. Cappelli, A. P. Moore, and R. F. Trzeciak. 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Chagarlamudi, B. Panda, and Y. Hu. 2009. Insider threat in database systems: Preventing malicious users’ activities in databases. In Proceedings of the International Conference on Information Technology: New Generations. IEEE, Los Alamitos, CA, 1616--1620. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. T. Chen, F. Kammüller, I. Nemli, and C. W. Probst. 2015. A probabilistic analysis framework for malicious insider threats. In Proceedings of the Conference on Human Aspects of Information Security, Privacy, and Trust. 178--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. R. Chinchani, D. Ha, A. Iyer, H. Q. Ngo, and S. Upadhyaya. 2010. Insider threat assessment: Model, analysis and tool. In Network Security. Springer, 143--174.Google ScholarGoogle Scholar
  38. W. R. Claycomb, C. L. Huth, L. Flynn, D. M. McIntire, and T. B. Lewellen. 2012. Chronological examination of insider threat sabotage: Preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3, 4 (2012), 4--20.Google ScholarGoogle Scholar
  39. W. R. Claycomb and A. Nicoll. 2012. Insider threats to cloud computing: Directions for new research challenges. In Proceedings of the Annual Computer Software and Applications Conference. IEEE, Los Alamitos, CA, 387--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. W. R. Claycomb and D. Shin. 2010. Detecting insider activity using enhanced directory virtualization. In Proceedings of the Workshop on Insider Threats. ACM, New York, NY, 29--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. E. Cole and S. Ring. 2005. Insider Threat: Protecting the Enterprise From Sabotage, Spying, and Theft. Syngress. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. M. L. Collins, M. C. Theis, R. F. Trzeciak, J. R. Strozer, J. W. Clark, D. L. Costa, et al. 2016. Common Sense Guide to Prevention and Detection of Insider Threats (5th ed.). CERT, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  43. J. Crampton and M. Huth. 2010. Towards an access-control framework for countering insider threats. In Insider Threats in Cyber Security. Advances in Information Security, Vol. 49. Springer, 173--195.Google ScholarGoogle Scholar
  44. A. Cummings, T. Lewellen, D. McIntire, A. P. Moore, and R. Trzeciak. 2012. Insider Threat Study: Illicit Cyber Activity Involving Fraud in the US Financial Services Sector. Technical Report. CERT.Google ScholarGoogle Scholar
  45. Y. Desmedt and A. Shaghaghi. 2016. Function-based access control (FBAC): From access control matrix to access control tensor. In Proceedings of the International Workshop on Managing Insider Security Threats. ACM, New York, NY, 89--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. T. Dimkov, W. Pieters, and P. Hartel. 2010. Portunes: Representing attack scenarios spanning through the physical, digital and social domain. In Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. 112--129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. W. Eberle, J. Graves, and L. Holder. 2010. Insider threat detection using a graph-based approach. Journal of Applied Security Research 6, 1 (2010), 32--81.Google ScholarGoogle ScholarCross RefCross Ref
  48. W. Eberle and L. Holder. 2009. Mining for insider threats in business transactions and processes. In Proceedings of the IEEE Symposiumon Computational Intelligence and Data Mining (CIDM’09). IEEE, Los Alamitos, CA, 163--170.Google ScholarGoogle Scholar
  49. M. E. Edge and P. R. F. Sampaio. 2009. A survey of signature based methods for financial fraud detection. Computers and Security 28, 6 (2009), 381--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. N. Einwechter. 2010. Preventing and Detecting Insider Attacks Using IDS. Retrieved February 7, 2019 from https://www.symantec.com/connect/articles/preventing-and-detecting-insider-attacks-using-ids.Google ScholarGoogle Scholar
  51. A. El Masri, H. Wechsler, P. Likarish, and B. B. Kang. 2014. Identifying users with application-specific command streams. In Proceedings of the International Conference on Privacy, Security, and Trust. IEEE, Los Alamitos, CA, 232--238.Google ScholarGoogle Scholar
  52. J. Eom, M. Park, S. Park, and T. Chung. 2011. A framework of defense system for prevention of insider’s malicious behaviors. In Proceedings of the International Conference on Advanced Communication Technology. IEEE, Los Alamitos, CA, 982--987.Google ScholarGoogle Scholar
  53. F. Farahmand and E. H. Spafford. 2009. Insider behavior: An analysis of decision under risk. In Proceedings of the International Workshop on Managing Insider Security Threats. 22.Google ScholarGoogle Scholar
  54. F. Farahmand and E. H. Spafford. 2013. Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers 15, 1 (2013), 5--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. L. F. Fischer. 2003. Characterizing information systems insider offenders. In Proceedings of the Conference of the International Military Testing Association.Google ScholarGoogle Scholar
  56. V. N. Franqueira, A. van Cleeff, P. van Eck, and R. Wieringa. 2010. External insider threat: A real security challenge in enterprise value webs. In Proceedings of the International Conference on Availability, Reliability, and Security. 446--453.Google ScholarGoogle Scholar
  57. R. Garfinkel, R. Gopal, and P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48, 6 (2002), 749--764.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. R. Garfinkel, R. Gopal, and D. Rice. 2006. New approaches to disclosure limitation while answering queries to a database: Protecting numerical confidential data against insider threat based on data or algorithms. In Proceedings of the Hawaii International Conference on System Sciences, Vol. 6. IEEE, Los Alamitos, CA, 125a. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. A. Garg, R. Rahalkar, S. Upadhyaya, and K. Kwiat. 2006. Profiling users in GUI based systems for masquerade detection. In Proceedings of the 2006 IEEE Information Assurance Workshop. IEEE, Los Alamitos, CA, 48--54.Google ScholarGoogle Scholar
  60. I. A. Gheyas and A. E. Abdallah. 2016. Detection and prediction of insider threats to cyber security: A systematic literature review and meta-analysis. Big Data Analytics 1, 1 (2016), 6.Google ScholarGoogle ScholarCross RefCross Ref
  61. J. Glasser and B. Lindauer. 2013. Bridging the gap: A pragmatic approach to generating insider threat data. In Proceedings of the Security and Privacy Workshops. IEEE, Los Alamitos, CA, 98--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, et al. 2014. Generative adversarial nets. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 2672--2680. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. R. Gopal, R. Garfinkel, and P. Goes. 2002. Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Operations Research 50, 3 (2002), 501--516.Google ScholarGoogle ScholarCross RefCross Ref
  64. S. Greenberg. 1988. Using Unix: Collected Traces of 168 Users. Technical Report. Department of Computer Science, University of Calgary, Calgary, Canada.Google ScholarGoogle Scholar
  65. F. L. Greitzer and D. A. Frincke. 2010. Combining traditional cyber security audit data with psychosocial data: Towards predictive modeling for insider threat mitigation. In Insider Threats in Cyber Security. Advances in Information Security, Vol. 49. Springer, 85--113.Google ScholarGoogle Scholar
  66. F. L. Greitzer, D. A. Frincke, and M. Zabriskie. 2010. Social/ethical issues in predictive insider threat monitoring. In Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. IGI Global, Hershey, PA, 132--161.Google ScholarGoogle Scholar
  67. F. L. Greitzer, L. J. Kangas, C. F. Noonan, C. R. Brown, and T. Ferryman. 2013. Psychosocial modeling of insider threat risk based on behavioral and word use analysis. e-Service Journal 9, 1 (2013), 106--138.Google ScholarGoogle Scholar
  68. F. L. Greitzer, J. Strozer, S. Cohen, J. Bergey, J. Cowley, A. Moore, et al. 2014. Unintentional insider threat: Contributing factors, observables, and mitigation strategies. In Proceedings of the Hawaii International Conference on System Sciences. IEEE, Los Alamitos, CA, 2025--2034. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. D. Gritzalis, V. Stavrou, M. Kandias, and G. Stergiopoulos. 2014. Insider threat: Enhancing BPM through social media. In Proceedings of the International Conference on New Technologies, Mobility, and Security. IEEE, Los Alamitos, CA, 1--6.Google ScholarGoogle Scholar
  70. M. Hanley and J. Montelibano. 2011. Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration Near Insider Termination. Technical Report. DTIC Document.Google ScholarGoogle Scholar
  71. A. Harilal, F. Toffalini, J. Castellanos, J. Guarnizo, I. Homoliak, and M. Ochoa. 2017. TWOS: A dataset of malicious insider threat behavior based on a gamified competition. In Proceedings of the Workshop on Managing Insider Security Threats. ACM, New York, NY, 35--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Athul Harilal, Flavio Toffalini, Ivan Homoliak, John Castellanos, Juan Guarnizo, Soumik Mondal, et al. 2018. The wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 9, 1 (March 2018), 54--85.Google ScholarGoogle Scholar
  73. M. Hayden. 1999. The Insider Threat to US Government Information Systems. Technical Report. DTIC Document.Google ScholarGoogle Scholar
  74. S. Ho, J. Hancock, C. Booth, M. Burmester, X. Liu, and S. Timmarajus. 2016. Demystifying insider threat: Language-action cues in group dynamics. In Proceedings of the Hawaii International Conference on System Sciences. IEEE, Los Alamitos, CA, 2729--2738. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. S. M. Ho. 2008. Attribution-based anomaly detection: Trustworthiness in an online community. In Social Computing, Behavioral Modeling, and Prediction. Springer, 129--140.Google ScholarGoogle Scholar
  76. J. Hunker and C. W. Probst. 2011. Insiders and insider threats: An overview of definitions and mitigation techniques. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2, 1 (2011), 4--27.Google ScholarGoogle Scholar
  77. G. Jabbour and D. Menascé. 2009a. Stopping the insider threat: The case for implementing autonomic defense mechanisms in computing systems. In Proceedings of the International Conference of Information Security and Privacy.Google ScholarGoogle Scholar
  78. G. G. Jabbour and D. A. Menascé. 2009b. The insider threat security architecture: A framework for an integrated, inseparable, and uninterrupted self-protection mechanism. In Proceedings of the International Conference on Computational Science and Engineering. IEEE, Los Alamitos, CA, 244--251. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. R. V. Johnson, J. Lass, and W. M. Petullo. 2016. SimpleFlow. In Proceedings of the International Workshop on Managing Insider Security Threats. ACM, New York, NY, 35--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. F. Kammüller, J. R. C. Nurse, and C. W. Probst. 2016. Attack tree analysis for insider threats on the IoT using Isabelle. In Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust. 234--246.Google ScholarGoogle Scholar
  81. M. Kandias, K. Galbogini, L. Mitrou, and D. Gritzalis. 2013a. Insiders trapped in the mirror reveal themselves in social media. In Proceedings of the International Conference on Network and System Security. 220--235.Google ScholarGoogle Scholar
  82. M. Kandias, A. Mylonas, N. Virvilis, M. Theoharidou, and D. Gritzalis. 2010. An insider threat prediction model. In Trust, Privacy, and Security in Digital Business. Lecture Notes in Computer Science, Vol. 6264. Springer, 26--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. M. Kandias, V. Stavrou, N. Bozovic, L. Mitrou, and D. Gritzalis. 2013b. Can we trust this user? Predicting insider’s attitude via YouTube usage profiling. In Proceedings of the International Conference on Ubiquitous Intelligence and Computing. IEEE, Los Alamitos, CA, 347--354. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. M. Kandias, N. Virvilis, and D. Gritzalis. 2011. The insider threat in cloud computing. In Proceedings of the International Workshop on Critical Information Infrastructures Security. 93--103.Google ScholarGoogle Scholar
  85. I. Kantzavelou and S. Katsikas. 2010. A game-based intrusion detection mechanism to confront internal attackers. Computers and Security 29, 8 (2010), 859--874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, S. Rogers, et al. 2005. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. Technical Report. National Threat Assessment Center, Washington DC.Google ScholarGoogle Scholar
  87. Andrew Kellett. 2015. Trends and Future Directions in Data Security—2015 Vormetric Insider Threat Report. Technical Report. Vormetric Data Security.Google ScholarGoogle Scholar
  88. E. Kowalski, T. Conway, S. Keverline, M. Williams, D. Cappelli, B. Willke, et al. 2008. Insider Threat Study: Illicit Cyber Activity in the Government Sector. U.S. Secret Service, SEI CMU.Google ScholarGoogle Scholar
  89. T. Lane and C. E. Brodley. 1997. An application of machine learning to anomaly detection. In Proceedings of the National Information Systems Security Conference, Vol. 377. 366--380.Google ScholarGoogle Scholar
  90. T. Lane and C. E. Brodley. 1998. Approaches to online learning and concept drift for user identification in computer security. In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD’98). 259--263. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. A. Lazouski, F. Martinelli, and P. Mori. 2010. Usage control in computer security: A survey. Computer Science Review 4, 2 (2010), 81--99. http://www.sciencedirect.com/science/article/pii/S1574013710000146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. J. Leach. 2003. Improving user security behaviour. Computers and Security 22, 8 (2003), 685--692. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. J. Lee and Y. Lee. 2002. A holistic model of computer abuse within organizations. Information Management and Computer Security 10, 2 (2002), 57--63.Google ScholarGoogle ScholarCross RefCross Ref
  94. P. Legg, N. Moffat, J. R. C. Nurse, J. Happa, I. Agrafiotis, M. Goldsmith, et al. 2013. Towards a conceptual model and reasoning structure for insider threat detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 4 (2013), 20--37.Google ScholarGoogle Scholar
  95. P. A. Legg, O. Buckley, M. Goldsmith, and S. Creese. 2017. Automated insider threat detection system using user and role-based profile assessment. IEEE Systems Journal 11, 2 (June 2017), 503--512.Google ScholarGoogle ScholarCross RefCross Ref
  96. F. Linton, D. Joy, H. Schaefer, and A. Charron. 2000. OWL: A recommender system for organization-wide learning. Educational Technology and Society 3, 1 (2000), 62--76.Google ScholarGoogle Scholar
  97. R. P. Lippman, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, et al. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’00), Vol. 2. IEEE, Los Alamitos, CA, 12--26.Google ScholarGoogle Scholar
  98. A. Liu, C. Martin, T. Hetherington, and S. Matzner. 2005. A comparison of system call feature for insider threat detection. In Proceedings of the 6th Annual IEEE Systems, Man and Cybernetics, Information Assurance Workshop. 341--347.Google ScholarGoogle Scholar
  99. D. Liu, X. Wang, and J. Camp. 2008. Game-theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection 1 (2008), 75--80.Google ScholarGoogle ScholarCross RefCross Ref
  100. D. Liu, X. Wang, and L. J. Camp. 2009b. Mitigating inadvertent insider threats with incentives. In Proceedings of the International Conference on Financial Cryptography and Data Security. 1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Y. Liu, C. Corbett, K. Chiang, R. Archibald, B. Mukherjee, and D. Ghosal. 2009a. SIDD: A framework for detecting sensitive data exfiltration by an insider attack. In Proceedings of the Hawaii International Conference on System Sciences. IEEE, Los Alamitos, CA, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. K. D. Loch, H. H. Carr, and M. E. Warkentin. 1992. Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly 16, 2 (June 1992), 173--186.Google ScholarGoogle ScholarCross RefCross Ref
  103. M. Maasberg, J. Warren, and N. L. Beebe. 2015. The dark side of the insider: Detecting the insider threat through examination of dark triad personality traits. In Proceedings of the International Conference on System Sciences. IEEE, Los Alamitos, CA, 3518--3526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. G. Magklaras and S. Furnell. 2002. Insider threat prediction tool: Evaluating the probability of IT misuse. Computers and Security 21, 1 (2002), 62--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. G. Magklaras and S. Furnell. 2005. A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers and Security 24, 5 (2005), 371--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. G. Magklaras and S. Furnell. 2012. The insider threat prediction and specification language. In IProceedings of the 9th International Network Conference (INC’12). 51--61.Google ScholarGoogle Scholar
  107. M. A. Maloof and G. D. Stephens. 2007. Elicit: A system for detecting insiders who violate need-to-know. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. 146--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. T. Markham and C. Payne. 2001. Security at the network edge: A distributed firewall architecture. In Proceedings of the DARPA Information Survivability Conference and Exposition, Vol. 1. IEEE, Los Alamitos, CA, 279--286.Google ScholarGoogle Scholar
  109. I. Martinez-Moyano, E. Rich, S. Conrad, D. Andersen, and T. Stewart. 2008. A behavioral theory of insider-threat risks: A system dynamics approach. ACM Transactions on Modeling and Computer Simulation 18, 2 (2008), Article 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. I. J. Martinez-Moyano, S. H. Conrad, and D. F. Andersen. 2011. Modeling behavioral considerations related to information security. Computers and Security 30, 6 (2011), 397--409. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. S. Mathew, M. Petropoulos, H. Q. Ngo, and S. J. Upadhyaya. 2010. A data-centric approach to insider attack detection in database systems. In Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection (RAID’10). 382--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. S. Mathew, S. Upadhyaya, D. Ha, and H. Q. Ngo. 2008. Insider abuse comprehension through capability acquisition graphs. In Proceedings of the International Conference on Information Fusion. IEEE, Los Alamitos, CA, 1--8.Google ScholarGoogle Scholar
  113. R. A. Maxion and T. N. Townsend. 2002. Masquerade detection using truncated command lines. In Proceedings of the International Conference on Dependable Systems and Networks. IEEE, Los Alamitos, CA, 219--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. M. Maybury, P. Chase, B. Cheikes, D. Brackney, S. Matzner, T. Hetherington, et al. 2005. Analysis and Detection of Malicious Insiders. Technical Report. DTIC Document.Google ScholarGoogle Scholar
  115. M. Mayhew, M. Atighetchi, A. Adler, and R. Greenstadt. 2015. Use of machine learning in big data analytics for insider threat detection. In Proceedings of the 2015 IEEE Military Communications Conference (MILCOM’15). IEEE, Los Alamitos, CA, 915--922.Google ScholarGoogle Scholar
  116. J. McHugh. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4 (2000), 262--294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. C. Melara, J. M. Sarriegui, J. J. Gonzalez, A. Sawicka, and D. L. Cooke. 2003. A system dynamics model of an insider attack on an information system. In Proceedings of the International Conference of the System Dynamics Society. 20--24.Google ScholarGoogle Scholar
  118. D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman. 2009. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Annals of Internal Medicine 151, 4 (2009), 264--269.Google ScholarGoogle ScholarCross RefCross Ref
  119. A. P. Moore, D. M. Cappelli, T. C. Caron, E. Shaw, D. Spooner, and R. F. Trzeciak. 2011. A Preliminary Model of Insider Theft of Intellectual Property. Technical Report. CERT.Google ScholarGoogle Scholar
  120. A. P. Moore, D. M. Cappelli, and R. F. Trzeciak. 2008. The “Big Picture” of Insider IT Sabotage Across US Critical Infrastructures. Technical Report. Carnegie Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  121. M. Moore. 2016. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, Hershey, PA.Google ScholarGoogle Scholar
  122. J. Myers, M. Grimaila, and R. Mills. 2009. Towards insider threat detection using web server logs. In Proceedings of the Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. ACM, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. R. B. Myerson. 1997. Game Theory. Harvard University Press, Cambridge, MA.Google ScholarGoogle Scholar
  124. P. M. Nasr and A. Y. Varjani. 2014. Alarm based anomaly detection of insider attacks in SCADA system. In Proceedings of the 2014 Smart Grid Conference (SGC’14). IEEE, Los Alamitos, CA, 1--6.Google ScholarGoogle Scholar
  125. P. G. Neumann. 2010. Combatting insider threats. In Insider Threats in Cyber Security. Advances in Information Security, Vol. 49. Springer, 17--44.Google ScholarGoogle Scholar
  126. J. R. C. Nurse, O. Buckley, P. A. Legg, M. Goldsmith, S. Creese, G. R. T. Wright, et al. 2014. Understanding insider threat: A framework for characterising attacks. In Proceedings of the Workshop on Research for Insider Threat. IEEE, Los Alamitos, CA, 214--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. J. S. Okolica, G. L. Peterson, and R. F. Mills. 2008. Using PLSI-U to detect insider threats by datamining e-mail. International Journal of Security and Networks 3, 2 (2008), 114--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. J. Ophoff, A. Jensen, J. Sanderson-Smith, M. Porter, and K. Johnston. 2014. A Descriptive Literature Review and Classification of Insider Threat Research. Technical Report. Department of Information Systems, University of Cape Town, Cape Town, South Africa.Google ScholarGoogle Scholar
  129. S. Panigrahi, S. Sural, and A. K. Majumdar. 2013. Two-stage database intrusion detection by combining multiple evidence and belief update. Information Systems Frontiers 15, 1 (2013), 35--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. J. S. Park and S. M. Ho. 2004. Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. Springer, 201--213.Google ScholarGoogle Scholar
  131. P. Parveen, Z. R. Weger, B. Thuraisingham, K. Hamlen, and L. Khan. 2011. Supervised learning for insider threat detection using stream mining. In Proceedings of the International Conference on Tools With Artificial Intelligence. IEEE, Los Alamitos, CA, 1032--1039. Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. S. L. Pfleeger, J. B. Predd, J. Hunker, and C. Bulford. 2010. Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security 5, 1 (2010), 169--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. A. H. Phyo and S. M. Furnell. 2004. A detection-oriented classification of insider IT misuse. In Proceedings of the 3rd Security Conference.Google ScholarGoogle Scholar
  134. C. Posey, R. J. Bennett, and T. L. Roberts. 2011. Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes. Computers and Security 30, 6 (2011), 486--497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. S. Pramanik, V. Sankaranarayanan, and S. Upadhyaya. 2004. Security policies to mitigate insider threat in the document control domain. In Proceedings of the 20th Annual Computer Security Applications Conference. IEEE, Los Alamitos, CA, 304--313. Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. J. Predd, S. L. Pfleeger, J. Hunker, and C. Bulford. 2008. Insiders behaving badly. IEEE Security and Privacy 6, 4 (2008), 66--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. C. W. Probst, R. R. Hansen, and F. Nielson. 2006. Where can an insider attack? In Proceedings of the International Workshop on Formal Aspects in Security and Trust. 127--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. C. W. Probst and J. Hunker. 2010. The risk of risk analysis and its relation to the economics of insider threats. In Economics of Information Security and Privacy. Springer, 279--299.Google ScholarGoogle Scholar
  139. C. W. Probst, J. Hunker, M. Bishop, and D. Gollmann. 2008. Summary—Countering insider threats. In Countering Insider Threats (Dagstuhl Seminar). Leibniz-Zentrum fuer Informatik, Germany.Google ScholarGoogle Scholar
  140. C. W. Probst, J. Hunker, D. Gollmann, and M. Bishop. 2010. Aspects of insider threats. In Insider Threats in Cyber Security. Advances in Information Security, Vol. 49. Springer, 1--15.Google ScholarGoogle Scholar
  141. PWC. 2017. Global Economic Crime Survey 2016: US Results. Retrieved February 7, 2019 from https://www.pwc.com/us/en/forensic-services/economic-crime-survey-us-supplement.html.Google ScholarGoogle Scholar
  142. M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. 2005. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. Technical Report. CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  143. V. Raskin, J. M. Taylor, and C. F. Hempelmann. 2010. Ontological semantic technology for detecting insider threat and social engineering. In Proceedings of the Workshop on New Security Paradigms. ACM, New York, NY, 115--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. I. Ray and N. Poolsapassit. 2005. Using attack trees to identify malicious attacks from authorized insiders. In Proceedings of the European Symposium on Research in Computer Security. 231--246. Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. J. Reason. 1990. Human Error. Cambridge University Press.Google ScholarGoogle Scholar
  146. E. Rich, I. J. Martinez-Moyano, S. Conrad, D. M. Cappelli, et al. 2005. Simulating insider cyber-threat risks: A model-based case and a case-based model. In Proceedings of the International Conference of the System Dynamics Society. 17--21.Google ScholarGoogle Scholar
  147. G. P. Richardson. 2001. System dynamics. Encyclopedia of Operations Research and Management Science. Springer US, 807–810.Google ScholarGoogle Scholar
  148. P. R. Sackett. 2002. The structure of counterproductive work behaviors: Dimensionality and relationships with facets of job performance. International Journal of Selection and Assessment 10, 1--2 (2002), 5--11.Google ScholarGoogle ScholarCross RefCross Ref
  149. M. B. Salem, S. Hershkop, and S. J. Stolfo. 2008. A survey of insider attack detection research. In Insider Attack and Cyber Security. Advances in Information Security, Vol. 39. Springer, 69--90.Google ScholarGoogle Scholar
  150. M. B. Salem and S. J. Stolfo. 2009. Masquerade Attack Detection Using a Search-Behavior Modeling Approach. Technical Report CUCS-027-09. Computer Science Department, Columbia University, New York, NY.Google ScholarGoogle Scholar
  151. M. B. Salem and S. J. Stolfo. 2011. Modeling user search behavior for masquerade detection. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. 181--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. V. Sankaranarayanan, S. Pramanik, and S. Upadhyaya. 2006. Detecting masquerading users in a document management system. In Proceedings of the International Conference on Communications, Vol. 5. IEEE, Los Alamitos, CA, 2296--2301.Google ScholarGoogle Scholar
  153. E. Santos, H. Nguyen, F. Yu, K. Kim, D. Li, J. T. Wilkinson, et al. 2008. Intent-driven insider threat detection in intelligence analyses. In Proceedings of the Conference on Web Intelligence and Intelligent Agent Technology. IEEE, Los Alamitos, CA, 345--349. Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. A. Sanzgiri and D. Dasgupta. 2016. Classification of insider threat detection techniques. In Proceedings of the Annual Cyber and Information Security Research Conference. ACM, New York, NY, 25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. M. Schonlau, W. DuMouchel, W. Ju, A. F. Karr, M. Theus, and Y. Vardi. 2001. Computer intrusion: Detecting masquerades. Statistical Science 16, 1 (2001), 58--74.Google ScholarGoogle ScholarCross RefCross Ref
  156. E. Schultz. 2002. A framework for understanding and predicting insider attacks. Computers and Security 21, 6 (2002), 526--531. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. E. Schultz and R. Shumway. 2001. Incident Response: A Strategic Guide to Handling System and Network Security Breaches. SAMS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. T. E. Senator, H. G. Goldberg, A. Memory, W. T. Young, B. Rees, R. Pierce, et al. 2013. Detecting insider threats in a real corporate database of computer usage activity. In Proceedings of the International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, 1393--1401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. D. Servos and S. L. Osborn. 2017. Current research and open problems in attribute-based access control. ACM Computing Surveys 49, 4 (2017), 65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. A. Shabtai, Y. Elovici, and L. Rokach. 2012. A Survey of Data Leakage Detection and Prevention Solutions. Springer Science 8 Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. N. Shalev, I. Keidar, Y. Moatti, and Y. Weinsberg. 2016. WatchIT: Who watches your IT guy? In Proceedings of the International Workshop on Managing Insider Security Threats. ACM, New York, NY, 93--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. E. Shaw, K. Ruby, and J. Post. 1998. The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin 2, 98 (1998), 1--10.Google ScholarGoogle Scholar
  163. E. D. Shaw. 2006. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 3, 1 (2006), 20--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. E. D. Shaw and L. F. Fischer. 2005. Ten Tales of Betrayal: The Threat to Corporate Infrastructure by Information Technology Insiders Analysis and Observations. Technical Report. DTIC Document.Google ScholarGoogle Scholar
  165. F. M. Sibai and D. A. Menascé. 2011. Defeating the insider threat via autonomic network capabilities. In Proceedings of the International Conference on Communication Systems and Networks. IEEE, Los Alamitos, CA, 1--10.Google ScholarGoogle Scholar
  166. S. Sinclair and S. W. Smith. 2008. Preventative directions for insider threat mitigation via access control. In Insider Attack and Cyber Security. Advances in Information Security, Vol. 39. Springer, 165--194.Google ScholarGoogle Scholar
  167. S. J. Stolfo, M. B. Salem, and A. D. Keromytis. 2012. Fog computing: Mitigating insider data theft attacks in the cloud. In Proceedings of the Security and Privacy Workshops. IEEE, Los Alamitos, CA, 125--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. D. W. Straub and R. J. Welke. 1998. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (1998), 441--469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  169. K. Tang, M. Zhao, and M. Zhou. 2011. Cyber insider threats situation awareness using game theory and information fusion-based user behavior predicting algorithm. Journal of Information and Computational Science 8, 3 (2011), 529--545.Google ScholarGoogle Scholar
  170. M. Theoharidou, S. Kokolakis, M. Karyda, and E. Kiountouzis. 2005. The insider threat to information systems and the effectiveness of ISO17799. Computers and Security 24, 6 (2005), 472--484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. F. Toffalini, I. Homoliak, A. Harilal, A. Binder, and M. Ochoa. 2018. Detection of masqueraders based on graph partitioning of file system access events. In Proceedings of the Security and Privacy Workshops. IEEE, Los Alamitos, CA, 217--227.Google ScholarGoogle Scholar
  172. R. F. Trzeciak. 2017. SEI Cyber Minute: Insider Threats. Retrieved February 7, 2019 from http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=496626.Google ScholarGoogle Scholar
  173. A. Vance, B. Molyneux, and P. B. Lowry. 2012. Reducing unauthorized access by insiders through user interface design: Making end users accountable. In Proceedings of the Hawaii International Conference on System Science. IEEE, Los Alamitos, CA, 4623--4632. Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. D. S. Wall. 2013. Enemies within: Redefining the insider threat in organizational security policy. Security Journal 26, 2 (2013), 107--124.Google ScholarGoogle ScholarCross RefCross Ref
  175. R. Willison and M. Siponen. 2009. Overcoming the insider: Reducing employee computer crime through situational crime prevention. Communications of the ACM 52, 9 (2009), 133--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  176. R. Willison and M. Warkentin. 2009. Motivations for employee computer crime: Understanding and addressing workplace disgruntlement through the application of organisational justice. In Proceedings of the International Workshop on Information Systems Security Research. 127--144.Google ScholarGoogle Scholar
  177. R. Willison and M. Warkentin. 2013. Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly 37, 1 (2013), 1--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. J. F. Wolfswinkel, E. Furtmueller, and C. P. Wilderom. 2013. Using grounded theory as a method for rigorously reviewing literature. European Journal of Information Systems 22, 1 (2013), 45--55.Google ScholarGoogle ScholarCross RefCross Ref
  179. B. Wood. 2000. An insider threat model for adversary simulation. SRI International, Research on Mitigating the Insider Threat to Information Systems 2 (2000), 1--3.Google ScholarGoogle Scholar
  180. J. Wu, J. Zhou, J. Ma, S. Mei, and J. Ren. 2011. An active data leakage prevention model for insider threat. In Proceedings of the International Symposium on Intelligence Information Processing and Trusted Computing. IEEE, Los Alamitos, CA, 39--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  181. L. Yang, Z. Hu, J. Long, and T. Guo. 2011. 5W1H-based conceptual modeling framework for domain ontology and its application on STPO. In Proceedings of the International Conference on Semantics Knowledge and Grid. IEEE, Los Alamitos, CA, 203--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Q. Yaseen and B. Panda. 2011. Enhanced insider threat detection model that increases data availability. In Proceedings of the International Conference on Distributed Computing and Internet Technology. 267--277. Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. N. Zhang, W. Yu, X. Fu, and S. K. Das. 2010. Maintaining defender’s reputation in anomaly detection against insider attacks. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 40, 3 (2010), 597--611. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 52, Issue 2
      March 2020
      770 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/3320149
      • Editor:
      • Sartaj Sahni
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 April 2019
      • Accepted: 1 January 2019
      • Revised: 1 November 2018
      • Received: 1 January 2018
      Published in csur Volume 52, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • survey
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format