Authors
Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John Fitzgerald, Aad van Moorsel, Sujeewa Alwis
Publication date
2015/10/16
Book
Proceedings of the 7th ACM CCS international workshop on managing insider security threats
Pages
1-12
Description
In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. We note that this behaviour may be malicious (for example, an employee is seeking to act against the best interest of the organisation by stealing confidential information) or benign (for example, an employee is applying some workaround to complete their job). To help distinguish between users who are intentionally malicious and those who are benign, we use human behaviour modelling along with Artificial Intelligence. Ben-ware has been developed as a distributed system comprising of probes for data collection, intermediate nodes for data routing and higher nodes for data analysis. This allows for real-time analysis with low impact on the overall infrastructure, which may contain legacy and low-power resources. We present an …
Total citations
2015201620172018201920202021202212342722
Scholar articles