dc.contributor.author | Yamin, Muhammad Mudassar | |
dc.contributor.author | Katt, Basel | |
dc.contributor.author | Sattar, Kashif | |
dc.contributor.author | Bin Ahmed, Maaz | |
dc.date.accessioned | 2019-10-24T11:05:40Z | |
dc.date.available | 2019-10-24T11:05:40Z | |
dc.date.created | 2019-05-27T13:26:09Z | |
dc.date.issued | 2019 | |
dc.identifier.issn | 2367-3370 | |
dc.identifier.uri | http://hdl.handle.net/11250/2624129 | |
dc.description.abstract | An organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information from its agents like former employees, current employees, vendors or business associates. These kinds of threats which are posed from within the organization are known as Insider Threats. Many approaches have been employed to detect the Insider Threats in organizations. One of such approaches is to monitor the system functions to detect possible insiders. These approaches raise unnecessary amount of false positive alarm which is then taken care of with the use of evolutionary algorithms. The solution to this Insider Threat detection requires a lot of configuration before implementation in real world scenarios due to different threshold values in different organizations. Insider Threat detection can be done by means of honeypots sensors in a limited and in satisfactory way. The present research proposes a new technique for detecting insiders using encrypted honeypots. This technique complements the existing insider detection systems and improves its performance in terms of decreasing false positive results. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.title | Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.journal | Lecture Notes in Networks and Systems | nb_NO |
dc.identifier.doi | 10.1007/978-3-030-12385-7_56 | |
dc.identifier.cristin | 1700497 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Networks and Systems] Locked until 2.2.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-12385-7_56 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |