Articles

Designing Host and Network Sensors to Mitigate the Insider Threat

Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore

Insider attacks--that is, attacks by users with privileged knowledge about a system--are a growing problem for many organizations. To address this threat, the authors have designed an architecture for insider threat detection that combines an array of complementary monitoring and auditing techniques.

Subjects

Files

Also Published In

Title
IEEE Security & Privacy
DOI
https://doi.org/10.1109/MSP.2009.109

More About This Work

Academic Units
Computer Science
Published Here
April 20, 2010