loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Bushra A. Alahmadi 1 ; Philip A. Legg 2 and Jason R. C. Nurse 1

Affiliations: 1 University of Oxford, United Kingdom ; 2 University of the West of England, United Kingdom

ISBN: 978-989-758-097-0

Keyword(s): Insider-threat Detection, Behavioural Analysis, Internet Activity, Psychological Traits.

Abstract: The insider-threat problem continues to be a major risk to both public and private sectors, where those people who have privileged knowledge and access choose to abuse this in some way to cause harm towards their organisation. To combat against this, organisations are beginning to invest heavily in deterrence monitoring tools to observe employees’ activity, such as computer access, Internet browsing, and email communications. Whilst such tools may provide some way towards detecting attacks afterwards, what may be more useful is preventative monitoring, where user characteristics and behaviours inform about the possibility of an attack before it happens. Psychological research advocates that the behaviour and preference of a person can be explained to a great extent by psychological constructs called personality traits, which could then possibly indicate the likelihood of an individual being a potential insider threat. By considering how browsing content relates to psychological constr ucts (such as OCEAN), and how an individual’s browsing behaviour deviates over time, potential insider-threats could be uncovered before significant damage is caused. The main contribution in this paper is to explore how Internet browsing activity could be used to predict the individual’s psychological characteristics in order to detect potential insider-threats. Our results demonstrate that predictive assessment can be made between the content available on a website, and the associated personality traits, which could greatly improve the prospects of preventing insider attacks. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.224.255.17

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Alahmadi B., Legg P. and Nurse J. (2015). Using Internet Activity Profiling for Insider-threat Detection.In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: WOSIS, (ICEIS 2015) ISBN 978-989-758-097-0, pages 709-720. DOI: 10.5220/0005480407090720

@conference{wosis15,
author={Bushra A. Alahmadi and Philip A. Legg and Jason R. C. Nurse},
title={Using Internet Activity Profiling for Insider-threat Detection},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: WOSIS, (ICEIS 2015)},
year={2015},
pages={709-720},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005480407090720},
isbn={978-989-758-097-0},
}

TY - CONF

JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: WOSIS, (ICEIS 2015)
TI - Using Internet Activity Profiling for Insider-threat Detection
SN - 978-989-758-097-0
AU - Alahmadi B.
AU - Legg P.
AU - Nurse J.
PY - 2015
SP - 709
EP - 720
DO - 10.5220/0005480407090720

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.