{"title":"Web访问模式揭示了内部人员的行为","authors":"A. Gamachchi, S. Boztaş","doi":"10.1109/IWSDA.2015.7458417","DOIUrl":null,"url":null,"abstract":"Insider threat is one of the most serious information security threats which is growing at an alarming rate leading to a compromise of confidentiality, integrity and availability of information assets in all critical infrastructure sector organizations. This study proposes a hybrid user profile model which is based on technical access patterns, behavioral patterns, psychological factors and organizational position for this complex and unique problem. In this study we have investigated common characteristics among enterprise users based on their web access pattern which is a part of the behavioral analysis of our model. The results of this analysis reveal majority of users have common web access patterns compared to the minority user base who shows individual user behavior.","PeriodicalId":371829,"journal":{"name":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Web access patterns reveal insiders behavior\",\"authors\":\"A. Gamachchi, S. Boztaş\",\"doi\":\"10.1109/IWSDA.2015.7458417\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Insider threat is one of the most serious information security threats which is growing at an alarming rate leading to a compromise of confidentiality, integrity and availability of information assets in all critical infrastructure sector organizations. This study proposes a hybrid user profile model which is based on technical access patterns, behavioral patterns, psychological factors and organizational position for this complex and unique problem. In this study we have investigated common characteristics among enterprise users based on their web access pattern which is a part of the behavioral analysis of our model. The results of this analysis reveal majority of users have common web access patterns compared to the minority user base who shows individual user behavior.\",\"PeriodicalId\":371829,\"journal\":{\"name\":\"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWSDA.2015.7458417\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWSDA.2015.7458417","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Insider threat is one of the most serious information security threats which is growing at an alarming rate leading to a compromise of confidentiality, integrity and availability of information assets in all critical infrastructure sector organizations. This study proposes a hybrid user profile model which is based on technical access patterns, behavioral patterns, psychological factors and organizational position for this complex and unique problem. In this study we have investigated common characteristics among enterprise users based on their web access pattern which is a part of the behavioral analysis of our model. The results of this analysis reveal majority of users have common web access patterns compared to the minority user base who shows individual user behavior.