An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract)

RECENT ADVANCES IN INTRUSION DETECTION, RAID 2008(2008)

Cited 3|Views1
No score
Abstract
Rogue employees with access to sensitive information can easily abuse their access to engage in information theft. To help differentiate malicious from benign behavior, this study measures how participants, given a common search topic, seek information. This study uses double-blind procedures, a stratified sample, and carefully designed control and experimental conditions. We seek to validate previously identified network indicators (ELICIT), find new host-based behaviors, and consider other human attributes that affect the information-use of malicious insiders by comparing their behavior to equivalent non-malicious users.
More
Translated text
Key words
double-blind procedure,equivalent non-malicious user,common search topic,sensitive information,malicious insider,new host-based behavior,empirical approach,information theft,study measure,insider threat,malicious users,detection,benign behavior,misuse.,extended abstract,experimental condition,identify information misuse,stratified sampling
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined