Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.

J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

AS Sohal, R Sandhu, SK Sood, V Chang - Computers & Security, 2018 - Elsevier
Device security is one of the major challenges for successful implementation of Internet of
Things and fog computing environment in current IT space. Researchers and Information …

A new intelligent multilayer framework for insider threat detection

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - Computers & Electrical …, 2022 - Elsevier
In several earlier studies, machine learning (ML) has been widely used for building insider
threat detection systems. However, the selection of the most appropriate ML classification …

User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach

J D'Arcy, A Hovav, D Galletta - Information systems research, 2009 - pubsonline.informs.org
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …

Detecting insider threat via a cyber-security culture framework

A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …

[HTML][HTML] Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today's digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …

[HTML][HTML] A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data

A Azaria, A Richardson, S Kraus… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …

Taxonomy of compliant information security behavior

K Padayachee - Computers & Security, 2012 - Elsevier
This paper aims at surveying the extrinsic and intrinsic motivations that influence the
propensity toward compliant information security behavior. Information security behavior …