skip to main content
10.1145/2746194.2746214acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

Detecting insider threats in software systems using graph models of behavioral paths

Published:21 April 2015Publication History

ABSTRACT

Insider threats are a well-known problem, and previous studies have shown that it has a huge impact over a wide range of sectors like financial services, governments, critical infrastructure services and the telecommunications sector. Users, while interacting with any software system, leave a trace of what nodes they accessed and in what sequence. We propose to translate these sequences of observed activities into paths on the graph of the underlying software architectural model. We propose a clustering algorithm to find anomalies in the data, which can be combined with contextual information to confirm as an insider threat.

References

  1. I. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White. Visualization of navigation patterns on a web site using model-based clustering. In Proceedings of ACM SIGKDD, pages 280--284, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Cummings, T. Lewellen, D. McIntire, A. Moore, and R. Trzeciak. Insider threat study:illicit cyber activity involving fraud in the US financial services sector. Special Report, CERT, Software Engineering Institute, 2012.Google ScholarGoogle Scholar
  3. D. Garlan and B. Schmerl. Architecture-driven modelling and analysis. In Proceedings of SCS'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Hennig, U. Brandes, J. Pfeffer, and I. Mergel. Studying Social Networks. A Guide to Empirical Research. Campus Verlag, Frankfurt, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Detecting insider threats in software systems using graph models of behavioral paths

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security
                April 2015
                170 pages
                ISBN:9781450333764
                DOI:10.1145/2746194
                • General Chair:
                • David Nicol

                Copyright © 2015 Owner/Author

                Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 21 April 2015

                Check for updates

                Qualifiers

                • poster

                Acceptance Rates

                HotSoS '15 Paper Acceptance Rate13of22submissions,59%Overall Acceptance Rate34of60submissions,57%
              • Article Metrics

                • Downloads (Last 12 months)4
                • Downloads (Last 6 weeks)0

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader