Show simple item record

dc.contributor.authorYamin, Muhammad Mudassar
dc.contributor.authorKatt, Basel
dc.contributor.authorSattar, Kashif
dc.contributor.authorBin Ahmed, Maaz
dc.date.accessioned2019-10-24T11:05:40Z
dc.date.available2019-10-24T11:05:40Z
dc.date.created2019-05-27T13:26:09Z
dc.date.issued2019
dc.identifier.issn2367-3370
dc.identifier.urihttp://hdl.handle.net/11250/2624129
dc.description.abstractAn organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information from its agents like former employees, current employees, vendors or business associates. These kinds of threats which are posed from within the organization are known as Insider Threats. Many approaches have been employed to detect the Insider Threats in organizations. One of such approaches is to monitor the system functions to detect possible insiders. These approaches raise unnecessary amount of false positive alarm which is then taken care of with the use of evolutionary algorithms. The solution to this Insider Threat detection requires a lot of configuration before implementation in real world scenarios due to different threshold values in different organizations. Insider Threat detection can be done by means of honeypots sensors in a limited and in satisfactory way. The present research proposes a new technique for detecting insiders using encrypted honeypots. This technique complements the existing insider detection systems and improves its performance in terms of decreasing false positive results.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleImplementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analyticsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.journalLecture Notes in Networks and Systemsnb_NO
dc.identifier.doi10.1007/978-3-030-12385-7_56
dc.identifier.cristin1700497
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Networks and Systems] Locked until 2.2.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-12385-7_56nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record