메뉴 건너뛰기




Volumn , Issue , 2011, Pages 119-124

Leveraging social networks to detect anomalous insider actions in collaborative environments

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS LOG; AGGREGATE BEHAVIOR; COLLABORATIVE ENVIRONMENTS; COLLABORATIVE INFORMATION SYSTEMS; COMPLEX DYNAMIC SYSTEMS; ELECTRONIC HEALTH RECORD SYSTEMS; EMPIRICAL EVALUATIONS; INSIDER THREAT; INSIDER THREAT DETECTIONS; ROC CURVES; SOCIAL NETWORKS; SPECIALIZED NETWORKS; THEORETICAL BASIS; VARIOUS ATTACKS; WIKIPEDIA;

EID: 80052910270     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISI.2011.5984061     Document Type: Conference Paper
Times cited : (15)

References (28)
  • 1
    • 10944272139 scopus 로고    scopus 로고
    • Friends and neighbors on the Web
    • DOI 10.1016/S0378-8733(03)00009-1, PII S0378873303000091
    • ADAMIC, L. A., AND ADAR, E. Friends and neighbors on the web. Social Networks 25(3) (2003), 211-230. (Pubitemid 36831776)
    • (2003) Social Networks , vol.25 , Issue.3 , pp. 211-230
    • Adamic, L.A.1    Adar, E.2
  • 2
    • 45749089618 scopus 로고    scopus 로고
    • Purpose based access control for privacy protection in relational database systems
    • BYUN, 1., AND U, N. Purpose based access control for privacy protection in relational database systems. VLDB 17 (2008), 603-619 .
    • (2008) VLDB , vol.17 , pp. 603-619
    • Byun, J.1    Li, N.2
  • 3
    • 79952805765 scopus 로고    scopus 로고
    • Detection of anomalous insiders in collaborative environments via relational analysis of access logs
    • CHEN, Y., AND MALIN, B. Detection of anomalous insiders in collaborative environments via relational analysis of access logs. In CODA SPY (2011), pp. 63-74.
    • (2011) CODA SPY , pp. 63-74
    • Chen, Y.1    Malin, B.2
  • 5
    • 70350070573 scopus 로고    scopus 로고
    • Developing insider attack detection model: A grounded approach
    • Doss, G., AND G.TEJAY. Developing insider attack detection model: A grounded approach. In ISI(2009), pp. 107-112.
    • (2009) ISI , pp. 107-112
    • Doss, G.1    Tejay, G.2
  • 6
    • 70350052839 scopus 로고    scopus 로고
    • Applying graph-based anomaly detection approaches to the discovery of insider threats
    • EBERLE, W., AND HOLDER, L. Applying graph-based anomaly detection approaches to the discovery of insider threats. In ISI(2009), pp. 206-208.
    • (2009) ISI , pp. 206-208
    • Eberle, W.1    Holder, L.2
  • 7
    • 76849086013 scopus 로고    scopus 로고
    • Behavioral changes following the collaborative development of an accounting information system
    • ELDENBURG, L., SODERSTROM, N., W ILLIS, Y., AND Wu, A. Behavioral changes following the collaborative development of an accounting information system. Accounting, Organizations and Society 35, 2 (2010), 222-237.
    • (2010) Accounting, Organizations and Society , vol.35 , Issue.2 , pp. 222-237
    • Eldenburg, L.1    Soderstrom, N.2    Illis Y, W.3    Wu, A.4
  • 8
    • 0035790754 scopus 로고    scopus 로고
    • Flexible team-based access control using contexts
    • GEORGIADIS, c., MAVRIDIS, I., PANGALOS, G., AND THOMAS, R. Flexible team-based access control using contexts. In SACMAT (2001), pp. 21-27.
    • (2001) SACMAT , pp. 21-27
    • Georgiadis, C.1    Mavridis, I.2    Pangalos, G.3    Thomas, R.4
  • 9
    • 44549088088 scopus 로고    scopus 로고
    • Collective knowledge systems: Where the social web meets the semantic web
    • GRUBER, T. Collective knowledge systems: where the social web meets the semantic web. Journal of Web Semantics 6, 1 (2007), 4-13.
    • (2007) Journal of Web Semantics , vol.6 , Issue.1 , pp. 4-13
    • Gruber, T.1
  • 11
    • 47649119832 scopus 로고    scopus 로고
    • A collaborative support tool for creativity learning: Idea storming cube
    • HUANG, C., U, T., WANG, H., AND CHANG, C. A collaborative support tool for creativity learning: Idea storming cube. In ICALT (2007), pp. 31-35.
    • (2007) ICALT , pp. 31-35
    • Huang, C.1    Li, T.2    Wang, H.3    Chang, C.4
  • 12
    • 57349145290 scopus 로고    scopus 로고
    • Context-aware role-based access control in pervasive computing systems
    • KULKARNI, D., AND TRIPATHI, A. Context-aware role-based access control in pervasive computing systems. In SACMAT (2008), pp. 113-122.
    • (2008) SACMAT , pp. 113-122
    • Kulkarni, D.1    Tripathi, A.2
  • 13
    • 84890758488 scopus 로고    scopus 로고
    • Governance in social media: A case study of the Wikipedia promotion process
    • LESKOVEC, J., HUTTENLOCHER, D., AND KLEINBERG, J. Governance in social media: A case study of the Wikipedia promotion process. In [CWSM (2010).
    • (2010) CWSM
    • Leskovec, J.1    Huttenlocher, D.2    Kleinberg, J.3
  • 14
    • 79952774177 scopus 로고    scopus 로고
    • Learning relational policies from electronic health record access logs
    • In Press
    • MALIN, B., NYEMBA, S., AND PAULETT, J. Learning relational policies from electronic health record access logs. JBI (2011), In Press.
    • (2011) JBI
    • Malin, B.1    Nyemba, S.2    Paulett, J.3
  • 15
    • 33745956063 scopus 로고    scopus 로고
    • Reviewing the benefits and costs of electronic health records and associated patient safety technologies
    • DOI 10.1007/s10916-005-7988-x
    • MENACHEMI, N., AND BROOKS, R. Reviewing the benefits and costs of electronic health records and associated patient safety technologies. Journal of Medical Systems 30, 3 (2008), 159-168. (Pubitemid 44060918)
    • (2006) Journal of Medical Systems , vol.30 , Issue.3 , pp. 159-168
    • Menachemi, N.1    Brooks, R.G.2
  • 16
    • 12244268431 scopus 로고    scopus 로고
    • Graph-based anomaly detection
    • NOBLE, C. C., AND COOK, D. J. Graph-based anomaly detection. In SIGKDD (2003), pp. 631-636.
    • (2003) SIGKDD , pp. 631-636
    • Noble, C.C.1    Cook, D.J.2
  • 18
    • 85052617391 scopus 로고    scopus 로고
    • Item-based collaborative filtering recommendation algorithms
    • SARWAR, B., KARYPIS, G., KONSTAN, J., AND J.RIEDL. Item-based collaborative filtering recommendation algorithms. In WWW (2001), pp. 285-295.
    • (2001) WWW , pp. 285-295
    • Sarwar, B.1    Karypis, G.2    Konstan, J.3    Riedl, J.4
  • 19
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • DOI 10.1016/S0167-4048(02)01009-X
    • SCHULTZ, E. A framework for understanding and predicting insider attacks. Computers and Security 21, 6 (2002), 526-531. (Pubitemid 35186246)
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 21
    • 27144518261 scopus 로고    scopus 로고
    • A novel anomaly detection scheme based on principal component classifier
    • SHYU, M., CHEN, S., SARINNAPAKORN, K., AND CHANG, L. A novel anomaly detection scheme based on principal component classifier. In ICDM (2003), pp. 172-179.
    • (2003) ICDM , pp. 172-179
    • Shyu, M.1    Chen, S.2    Sarinnapakorn, K.3    Chang, L.4
  • 23
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
    • THOMAS, R., AND SANDHU, S. Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management. In IFfP [CDS (1997), pp. 166-181.
    • (1997) IFfP [CDS] , pp. 166-181
    • Thomas, R.1    Sandhu, S.2
  • 24
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based intrusion detection systems
    • WAGNER, D., AND SOTO, P. Mimicry attacks on host-based intrusion detection systems. In CCS (2002), pp. 255-264.
    • (2002) CCS , pp. 255-264
    • Wagner, D.1    Soto, P.2
  • 25
    • 70350075657 scopus 로고    scopus 로고
    • Injecting a permission-based delegation model to secure web-based workflow systems
    • WANG, X., AND BAYRAK, C. Injecting a permission-based delegation model to secure web-based workflow systems. In ISI(2009), pp. 101-106.
    • (2009) ISI , pp. 101-106
    • Wang, X.1    Bayrak, C.2
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.