Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Statistical fraud detection: A review

RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …

Random forest for credit card fraud detection

S Xuan, G Liu, Z Li, L Zheng, S Wang… - 2018 IEEE 15th …, 2018 - ieeexplore.ieee.org
Credit card fraud events take place frequently and then result in huge financial losses.
Criminals can use some technologies such as Trojan or Phishing to steal the information of …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

[PDF][PDF] Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.

J Hunker, CW Probst - J. Wirel. Mob. Networks Ubiquitous Comput …, 2011 - isyou.info
Threats from the inside of an organization's perimeters are a significant problem, since it is
difficult to distinguish them from benign activity. In this overview article we discuss defining …

A survey of insider attack detection research

MB Salem, S Hershkop, SJ Stolfo - … Attack and Cyber Security: Beyond the …, 2008 - Springer
This paper surveys proposed solutions for the problem of insider attack detection appearing
in the computer security research literature. We distinguish between masqueraders and …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Computer intrusion: Detecting masquerades

M Schonlau, W DuMouchel, WH Ju, AF Karr, M Theus… - Statistical science, 2001 - JSTOR
Masqueraders in computer intrusion detection are people who use somebody else's
computer account. We investigate a number of statistical approaches for detecting …

Masquerade detection using truncated command lines

RA Maxion, TN Townsend - … international conference on …, 2002 - ieeexplore.ieee.org
A masquerade attack, in which one user impersonates another, can be the most serious
form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by …