How machine learning is catching up with the insider threat
Jamie Graves
Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 2, 127-133
Abstract:
The insider threat poses a unique cyber security challenge. When it comes to meeting this challenge, the type of ‘standard’ threat detection toolsets currently deployed by organisations tend to be inadequate. This paper aims to show how and why machine learning capabilities can help organisations to reduce these inadequacies, providing an essential extra element of protection. The paper explores the reality of the insider threat, illustrating that while the possibility of a malicious actor cannot be discounted, this threat is much more likely to arise through carelessness, inadvertence or lack of understanding. A focus on best practice and clear policies must always be part of the solution — backed up by threat detection tools. The paper explains the problems that can arise with such tools, including the delays and inaccuracies that can arise with configuration and updates. With its focus on behaviour (as opposed to reliance on signatures), it examines how machine learning is able to determine ‘usual’ activities and flag up events that fall outside of the ‘usual’, and looks at the benefits this can bring to cyber security teams, in terms of ability to detect as wide a range of abnormal activities as possible, improved visibility, more accurate insights and better use of resources.
Keywords: machine learning; insider threat; user behaviour; UEBA; forensics analysis (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/3272/download/ (application/pdf)
https://hstalks.com/article/3272/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:2:p:127-133
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().