2009 Articles
Designing Host and Network Sensors to Mitigate the Insider Threat
Insider attacks--that is, attacks by users with privileged knowledge about a system--are a growing problem for many organizations. To address this threat, the authors have designed an architecture for insider threat detection that combines an array of complementary monitoring and auditing techniques.
Subjects
Files
- insider_threats.pdf application/pdf 1.16 MB Download File
Also Published In
- Title
- IEEE Security & Privacy
- DOI
- https://doi.org/10.1109/MSP.2009.109
More About This Work
- Academic Units
- Computer Science
- Published Here
- April 20, 2010