Detecting Insider Threats in Software Systems using Graph Models of Behavioral Paths
Title | Detecting Insider Threats in Software Systems using Graph Models of Behavioral Paths |
Publication Type | Conference Proceedings |
Year of Publication | 2015 |
Authors | Hemank Lamba, Thomas Glazier, Bradley Schmerl, Jurgen Pfeffer, David Garlan |
Conference Name | HotSoS '15 Proceedings of the 2015 Symposium and Bootcamp on the Science of Security |
Date Published | 04/21/2015 |
Publisher | ACM New York, NY, USA ©2015 |
Conference Location | Urbana-Champaign, IL |
ISBN Number | 978-1-4503-3376-4 |
Keywords | CMU, July'15 |
Abstract | Insider threats are a well-known problem, and previous studies have shown that it has a huge impact over a wide range of sectors like financial services, governments, critical infrastructure services and the telecommunications sector. Users, while interacting with any software system, leave a trace of what nodes they accessed and in what sequence. We propose to translate these sequences of observed activities into paths on the graph of the underlying software architectural model. We propose a clustering algorithm to find anomalies in the data, which can be combined with contextual information to confirm as an insider threat. |
DOI | 10.1145/2746194.2746214 |
Citation Key | node-24937 |
Attachment | Size |
---|---|
bytes |
Groups: