Conference item icon

Conference item

Using Internet activity profiling for insider-threat detection

Abstract:
The insider-threat problem continues to be a major risk to both public and private sectors, where those people who have privileged knowledge and access choose to abuse this in some way to cause harm towards their organisation. To combat against this, organisations are beginning to invest heavily in deterrence monitoring tools to observe employees’ activity, such as computer access, Internet browsing, and email communications. Whilst such tools may provide some way towards detecting attacks afterwards, what may be more useful is preventative monitoring, where user characteristics and behaviours inform about the possibility of an attack before it happens. Psychological research advocates that the behaviour and preference of a person can be explained to a great extent by psychological constructs called personality traits, which could then possibly indicate the likelihood of an individual being a potential insider threat. By considering how browsing content relates to psychological constructs (such as OCEAN), and how an individual’s browsing behaviour deviates over time, potential insider-threats could be uncovered before significant damage is caused. The main contribution in this paper is to explore how Internet browsing activity could be used to predict the individual’s psychological characteristics in order to detect potential insider-threats. Our results demonstrate that predictive assessment can be made between the content available on a website, and the associated personality traits, which could greatly improve the prospects of preventing insider attacks.
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.5220/0005480407090720

Authors


More by this author
Institution:
University of Oxford
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author


Publisher:
Association for Computing Machinery
Host title:
Proceedings of the 12th International Workshop on Security in Information Systems (ICEIS 2015)
Pages:
709-720
Publication date:
2015-04-27
Edition:
Accepted Manuscript
Event title:
12th International Workshop on Security in Information Systems (ICEIS 2015)
Event location:
Barcelona, Spain
Event website:
https://iceis.scitevents.org/?y=2015
Event start date:
2015-04-27
Event end date:
2015-04-27
DOI:
ISSN:
2184-4992
ISBN:
978-989-758-097-0


Language:
English
Keywords:
UUID:
uuid:fcb91435-815f-4917-921b-a4b4b8dff542
Local pid:
ora:10697
Deposit date:
2015-03-23

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP