Authors
Brian Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos Keromytis, Salvatore Stolfo
Publication date
2009/8/21
Journal
IEEE security & privacy
Volume
7
Issue
6
Pages
22-29
Publisher
IEEE
Description
Insider attacks-that is, attacks by users with privileged knowledge about a system-are a growing problem for many organizations. To address this threat, the authors have designed an architecture for insider threat detection that combines an array of complementary monitoring and auditing techniques.
Total citations
Scholar articles
B Bowen, MB Salem, S Hershkop, A Keromytis, S Stolfo - IEEE security & privacy, 2009