Data-driven model-based detection of malicious insiders via physical access logs

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The risk posed by insider threats has usually been approached by analyzing the behavior of users solely in the cyber domain. In this paper, we show the viability of using physical movement logs, collected via a building access control system, together with an understanding of the layout of the building housing the system’s assets, to detect malicious insider behavior that manifests itself in the physical domain. In particular, we propose a systematic framework that uses contextual knowledge about the system and its users, learned from historical data gathered from a building access control system, to select suitable models for representing movement behavior. We then explore the online usage of the learned models, together with knowledge about the layout of the building being monitored, to detect malicious insider behavior. Finally, we show the effectiveness of the developed framework using real-life data traces of user movement in railway transit stations.

Cite

CITATION STYLE

APA

Cheh, C., Chen, B., Temple, W. G., & Sanders, W. H. (2017). Data-driven model-based detection of malicious insiders via physical access logs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10503 LNCS, pp. 275–291). Springer Verlag. https://doi.org/10.1007/978-3-319-66335-7_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free