[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SPW.2013.37guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data

Published: 23 May 2013 Publication History

Abstract

The threat of malicious insider activity continues to be of paramount concern in both the public and private sectors. Though there is great interest in advancing the state of the art in predicting and stopping these threats, the difficulty of obtaining suitable data for research, development, and testing remains a significant hinderance. We outline the use of synthetic data to enable progress in one research program, while discussing the benefits and limitations of synthetic insider threat data, the meaning of realism in this context, as well as future research directions.

Cited By

View all
  • (2024)A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and CountermeasuresACM Computing Surveys10.1145/370074957:3(1-36)Online publication date: 11-Nov-2024
  • (2024)Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and TrendsDigital Threats: Research and Practice10.1145/36960145:4(1-37)Online publication date: 17-Sep-2024
  • (2024)Detecting abnormal logins by discovering anomalous links via graph transformersComputers and Security10.1016/j.cose.2024.103944144:COnline publication date: 18-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SPW '13: Proceedings of the 2013 IEEE Security and Privacy Workshops
May 2013
180 pages
ISBN:9780769550176

Publisher

IEEE Computer Society

United States

Publication History

Published: 23 May 2013

Author Tags

  1. Insider Threat
  2. Modeling and Simulation
  3. Synthetic Data

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and CountermeasuresACM Computing Surveys10.1145/370074957:3(1-36)Online publication date: 11-Nov-2024
  • (2024)Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and TrendsDigital Threats: Research and Practice10.1145/36960145:4(1-37)Online publication date: 17-Sep-2024
  • (2024)Detecting abnormal logins by discovering anomalous links via graph transformersComputers and Security10.1016/j.cose.2024.103944144:COnline publication date: 18-Oct-2024
  • (2024)Insider threat detection in cyber-physical systemsComputers and Electrical Engineering10.1016/j.compeleceng.2024.109489119:PAOnline publication date: 1-Oct-2024
  • (2023)User Behavior Analysis for Detecting Compromised User AccountsCybernetics and Information Technologies10.2478/cait-2023-002723:3(102-113)Online publication date: 1-Sep-2023
  • (2023)Everest: GPU-Accelerated System for Mining Temporal MotifsProceedings of the VLDB Endowment10.14778/3626292.362629917:2(162-174)Online publication date: 1-Oct-2023
  • (2023)Metamorphic Malware and ObfuscationSecurity and Communication Networks10.1155/2023/82277512023Online publication date: 1-Jan-2023
  • (2023)Euler: Detecting Network Lateral Movement via Scalable Temporal Link PredictionACM Transactions on Privacy and Security10.1145/358877126:3(1-36)Online publication date: 27-Jun-2023
  • (2023)Adversarial Robustness of Phishing Email Detection ModelsProceedings of the 9th ACM International Workshop on Security and Privacy Analytics10.1145/3579987.3586567(67-76)Online publication date: 26-Apr-2023
  • (2023)A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.324541318(1638-1652)Online publication date: 1-Jan-2023
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media