Detecting insider threats solutions and trends

Sherali Zeadally, Byunggu Yu, Dong Hyun Jeong, Lily Liang

Research output: Contribution to journalArticlepeer-review

27 Scopus citations

Abstract

Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking.

Original languageEnglish
Pages (from-to)183-192
Number of pages10
JournalInformation Security Journal
Volume21
Issue number4
DOIs
StatePublished - Apr 2012

Bibliographical note

Funding Information:
This work was supported by a grant from the National Science Foundation (Grant NSF Award No 0911969). We thank Michael Pearce for his useful comments and feedback on early drafts of this paper. We would also like to express our gratitude to the anonymous reviewers for their comments and suggestions which helped us to improve the quality and presentation of this paper.

Keywords

  • Information security and risk management
  • Operations security
  • Telecommunications and network security threats

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Detecting insider threats solutions and trends'. Together they form a unique fingerprint.

Cite this