메뉴 건너뛰기




Volumn 42, Issue 2, 2012, Pages 331-347

Intelligence analyses and the insider threat

Author keywords

Cognitive styles; decision making process; insider threat; intelligence analyses

Indexed keywords

COGNITIVE STYLES; COMPREHENSIVE ANALYSIS; COMPUTATIONAL MODEL; DECISION MAKERS; DECISION MAKING PROCESS; DETECTION METHODS; DETECTION PERFORMANCE; INSIDER THREAT; INTELLIGENCE ANALYSIS; INTELLIGENCE COMMUNITIES; MALICIOUS INSIDERS; NOVEL METHODOLOGY; WORKING STYLES;

EID: 84857505501     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2011.2162500     Document Type: Article
Times cited : (16)

References (45)
  • 1
    • 0003950444 scopus 로고    scopus 로고
    • S. Rayner and R. J. Riding, Eds. Westport, CT: Greenwood
    • R. J. Riding and S. Rayner, Cognitive Styles, S. Rayner and R. J. Riding, Eds. Westport, CT: Greenwood, 2000.
    • (2000) Cognitive Styles
    • Riding, R.J.1    Rayner, S.2
  • 3
    • 84882794354 scopus 로고    scopus 로고
    • A survey of insider attack detection research
    • NewYork: Springer- Verlag
    • M. B. Salem, S. Hershkop, and S. J. Stolfo, "A survey of insider attack detection research," in Insider Attack and Cyber Security. NewYork: Springer-Verlag, 2008, pp. 69-90.
    • (2008) Insider Attack and Cyber Security , pp. 69-90
    • Salem, M.B.1    Hershkop, S.2    Stolfo, S.J.3
  • 4
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Aug.
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, Aug. 1998.
    • (1998) J. Comput. Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 7
    • 38149083999 scopus 로고    scopus 로고
    • Exploiting execution context for the detection of anomalous system calls
    • Gold Coast, Australia
    • D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer, "Exploiting execution context for the detection of anomalous system calls," in Proc. Int. Symp. RAID, Gold Coast, Australia, 2007, pp. 1-20.
    • (2007) Proc. Int. Symp. RAID , pp. 1-20
    • Mutz, D.1    Robertson, W.2    Vigna, G.3    Kemmerer, R.4
  • 8
    • 38149092413 scopus 로고    scopus 로고
    • Understanding precision in host based intrusion detection
    • M. S. Sharif, K. Singh, J. Giffin, and W. Lee, "Understanding precision in host based intrusion detection," in Proc. Int. Symp. RAID, 2007, pp. 21-41.
    • (2007) Proc. Int. Symp. RAID , pp. 21-41
    • Sharif, M.S.1    Singh, K.2    Giffin, J.3    Lee, W.4
  • 9
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/Jun.
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," IEEE Netw., vol. 8, no. 3, pp. 26-41, May/Jun. 1994.
    • (1994) IEEE Netw. , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 10
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • C. Ko, "Execution monitoring of security-critical programs in distributed systems: A specification-based approach," in Proc. IEEE Symp. Security Privacy, 1997, pp. 175-187.
    • (1997) Proc. IEEE Symp. Security Privacy , pp. 175-187
    • Ko, C.1
  • 13
    • 33747175399 scopus 로고    scopus 로고
    • AI lessons learned from experiments in insider threat detection
    • What Went Wrong and Why: Lessons from AI Research and Applications - Papers from the AAAI Spring Symposium, Technical Report
    • A. Liu, C. Martin, T. Hetherington, and S. Matzner, "AI lessons learned from experiments in insider threat detection," in Proc. AAAI Spring Symp., 2006, pp. 49-55. (Pubitemid 44230661)
    • (2006) AAAI Spring Symposium - Technical Report , vol.SS-06-08 , pp. 49-55
    • Liu, A.1    Martin, C.2    Hetherington, T.3    Matzner, S.4
  • 14
    • 0142157009 scopus 로고    scopus 로고
    • On the detection of anomalous system call arguments
    • C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, "On the detection of anomalous system call arguments," in Proc. ESORICS, 2003, pp. 326-343.
    • (2003) Proc. ESORICS , pp. 326-343
    • Kruegel, C.1    Mutz, D.2    Valeur, F.3    Vigna, G.4
  • 16
    • 0036931591 scopus 로고    scopus 로고
    • Masquerade detection using truncated command lines
    • R. A. Maxion and T. N. Townsend, "Masquerade detection using truncated command lines," in Proc. Int. Conf. DSN, 2002, pp. 219-228.
    • (2002) Proc. Int. Conf. DSN , pp. 219-228
    • Maxion, R.A.1    Townsend, T.N.2
  • 18
    • 1542378274 scopus 로고    scopus 로고
    • Masquerade detection using enriched command lines
    • San Francisco, CA
    • R. A. Maxion, "Masquerade detection using enriched command lines," in Proc. Int. Conf. DSN, San Francisco, CA, 2003, pp. 5-14.
    • (2003) Proc. Int. Conf. DSN , pp. 5-14
    • Maxion, R.A.1
  • 19
    • 0013420742 scopus 로고
    • Dept. Comput. Sci., Univ. Calgary, Calgary, AB, Canada, Tech. Rep. 88/333/45
    • S. Greenberg, "Using Unix: Collected traces of 168 users," Dept. Comput. Sci., Univ. Calgary, Calgary, AB, Canada, Tech. Rep. 88/333/45, 1988.
    • (1988) Using Unix: Collected Traces of 168 Users
    • Greenberg, S.1
  • 20
    • 84857502039 scopus 로고    scopus 로고
    • An architecture for contextual insider threat detection
    • M. Kirkpatrick, E. Bertino, and F. Sheldon, "An architecture for contextual insider threat detection," cspurdueedu, 2009, pp. 1-11.
    • (2009) Cspurdueedu , pp. 1-11
    • Kirkpatrick, M.1    Bertino, E.2    Sheldon, F.3
  • 21
    • 18844379137 scopus 로고    scopus 로고
    • Display-only file server: A solution against information theft due to insider attack
    • Y. Yang and C. Tzi-cker, "Display-only file server: A solution against information theft due to insider attack," in Proc. ACM Workshop Digital Rights, 2004, pp. 31-39.
    • (2004) Proc. ACM Workshop Digital Rights , pp. 31-39
    • Yang, Y.1    Tzi-Cker, C.2
  • 22
    • 21644453410 scopus 로고    scopus 로고
    • Security policies to mitigate insider threat in the document control domain
    • P. Suranjan, S. Vidyaraman, and U. Shambhu, "Security policies to mitigate insider threat in the document control domain," in Proc. Comput. Security Appl. Conf., 2004, pp. 304-313.
    • (2004) Proc. Comput. Security Appl. Conf. , pp. 304-313
    • Suranjan, P.1    Vidyaraman, S.2    Shambhu, U.3
  • 23
    • 38349036494 scopus 로고    scopus 로고
    • ELICIT: A system for detecting insiders who violate need-to-know
    • M. Maloof and G. D. Stephens, "ELICIT: A system for detecting insiders who violate need-to-know," in Proc. Recent Adv. Intrusion Detection, 2007, pp. 146-166.
    • (2007) Proc. Recent Adv. Intrusion Detection , pp. 146-166
    • Maloof, M.1    Stephens, G.D.2
  • 24
    • 35048848603 scopus 로고    scopus 로고
    • Towards a social network approach for monitoring insider threats to information security
    • Tucson, AZ
    • A. Natarajan and L. Hossain, "Towards a social network approach for monitoring insider threats to information security," in Proc. 2nd NSF/NIJ Symp. Intell. Security Informat., Tucson, AZ, 2004, pp. 501-507.
    • (2004) Proc. 2nd NSF/NIJ Symp. Intell. Security Informat. , pp. 501-507
    • Natarajan, A.1    Hossain, L.2
  • 26
    • 84857500663 scopus 로고    scopus 로고
    • Leveraging one-class SVM and semantic analysis to detect anomalous content
    • New York: Springer-Verlag
    • O. Yilmazel, S. Symonenko, N. Balasubramanian, and E. D. Liddy, "Leveraging one-class SVM and semantic analysis to detect anomalous content," in Terrorism Informatics. New York: Springer-Verlag, 2008, pp. 407-424.
    • (2008) Terrorism Informatics , pp. 407-424
    • Yilmazel, O.1    Symonenko, S.2    Balasubramanian, N.3    Liddy, E.D.4
  • 27
    • 33745931451 scopus 로고    scopus 로고
    • Composite role-based monitoring (CRBM) for countering insider threats
    • Tucson, AZ
    • J. S. Park and S. M. Ho, "Composite role-based monitoring (CRBM) for countering insider threats," in Proc. 2nd NSF/NIJ Symp. Intell. Security Informat., Tucson, AZ, 2004, pp. 201-213.
    • (2004) Proc. 2nd NSF/NIJ Symp. Intell. Security Informat. , pp. 201-213
    • Park, J.S.1    Ho, S.M.2
  • 29
  • 31
    • 35648995677 scopus 로고    scopus 로고
    • Impacts of user modeling on personalization of information retrieval: An evaluation with human intelligence analysts
    • E. Santos, Jr., Q. Zhao, H. Nguyen, and H. Wang, "Impacts of user modeling on personalization of information retrieval: An evaluation with human intelligence analysts," in Proc. 4th Workshop Eval. Adapt. Syst., Conjunction With UM, 2005, pp. 27-36.
    • (2005) Proc. 4th Workshop Eval. Adapt. Syst., Conjunction with UM , pp. 27-36
    • Santos Jr., E.1    Zhao, Q.2    Nguyen, H.3    Wang, H.4
  • 38
    • 24644478392 scopus 로고    scopus 로고
    • An insider threat model for adversary simulation
    • B. Wood, "An insider threat model for adversary simulation," in Proc. Res. Mitigating Insider Threat Inf. Syst., 2000, vol. 2, pp. 41-47.
    • (2000) Proc. Res. Mitigating Insider Threat Inf. Syst. , vol.2 , pp. 41-47
    • Wood, B.1
  • 40
    • 0014153614 scopus 로고
    • Stability of cognitive style from childhood to young adulthood
    • Nov.
    • H. A. Witkin, D. R. Goodenough, and S. A. Karp, "Stability of cognitive style from childhood to young adulthood," J. Personality Social Psychol., vol. 7, no. 3, pp. 291-300, Nov. 1967.
    • (1967) J. Personality Social Psychol. , vol.7 , Issue.3 , pp. 291-300
    • Witkin, H.A.1    Goodenough, D.R.2    Karp, S.A.3
  • 41
    • 0001628502 scopus 로고
    • Styles and strategies of learning
    • G. Pask, "Styles and strategies of learning," Brit. J. Educ. Psychol., vol. 46, no. II, pp. 128-148, 1976.
    • (1976) Brit. J. Educ. Psychol. , vol.46 , Issue.2 , pp. 128-148
    • Pask, G.1
  • 42
    • 84970382612 scopus 로고
    • Fielddependent and field-independent cognitive styles and their educational implications
    • H. A. Witkin, C. A. Moore, D. R. Goodenough, and P. W. Cox, "Fielddependent and field-independent cognitive styles and their educational implications," Rev. Educ. Res., vol. 47, no. 1, pp. 1-64, 1977.
    • (1977) Rev. Educ. Res. , vol.47 , Issue.1 , pp. 1-64
    • Witkin, H.A.1    Moore, C.A.2    Goodenough, D.R.3    Cox, P.W.4
  • 44
    • 0041694642 scopus 로고
    • Adaptors and innovators: A description and measure
    • Oct.
    • K. Michael, "Adaptors and innovators: A description and measure," J. Appl. Psychol., vol. 61, no. 5, pp. 622-629, Oct. 1976.
    • (1976) J. Appl. Psychol. , vol.61 , Issue.5 , pp. 622-629
    • Michael, K.1
  • 45
    • 70350035687 scopus 로고    scopus 로고
    • Researching the psychology of cognitive style and learning style: Is there really a future?
    • Dec.
    • E. R. Peterson, S. G. Rayner, and S. J. Armstrong, "Researching the psychology of cognitive style and learning style: Is there really a future?" Learning Individual Differences, vol. 19, no. 4, pp. 518-523, Dec. 2009.
    • (2009) Learning Individual Differences , vol.19 , Issue.4 , pp. 518-523
    • Peterson, E.R.1    Rayner, S.G.2    Armstrong, S.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.