Nothing Special   »   [go: up one dir, main page]

Skip to main content

Semantic Analysis for Monitoring Insider Threats

  • Conference paper
Intelligence and Security Informatics (ISI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3073))

Included in the following conference series:

Abstract

Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates the results of social network analysis, role-based access monitoring, and semantic analysis of insiders’ communications as evidence for evaluation by a risk assessor is being tested on an IC simulation. A semantic analysis, by our proven Natural Language Processing (NLP) system, of the insider’s text-based communications produces conceptual representations that are clustered and compared on the expected vs. observed scope. The determined risk level produces an input to a risk analysis algorithm that is merged with outputs from the system’s social network analysis and role-based monitoring modules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chen, A.H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.): Intelligence and Security Informatics: First NSF/NIJ Symposium. Proceedings of First NSF/NIJ Symposium, Tucson. Springer, Heidelberg (2003)

    Google Scholar 

  2. Allan, J., Lavrenko, V., Malin, D., Swan, R.: Detections, Bounds, and Timelines: UMass and TDT-3 (2000), http://citeseer.nj.nec.com/455856.html

  3. Anderson, J.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (April 15, 1980)

    Google Scholar 

  4. Anderson, R.: Research and Development Initiatives Focused on Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems: Results of a Three-Day Workshop (1999), http://www.rand.org/publications/CF/CF151/CF151.pdf

  5. Berkhin, P.: Survey Of Clustering Data Mining Techniques (2000), http://citeseer.nj.nec.com/berkhin02survey.html

  6. Burgoon, J., Blair, J., Qin, T., Nunamaker Jr., J.: Detecting Deception Through Linguistic Analysis. Presented at First NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ (2003)

    Google Scholar 

  7. Hotho, A., Staab, S., Stumme, G.: Text clustering based on background knowledge (2003), http://citeseer.nj.nec.com/hotho03text.html

  8. Lawrence, R.H., Bauer, R.K.: AINT misbehaving: A taxonomy of anti-intrusion techniques (2000), http://www.sans.org/resources/idfaq/aint.php

  9. Liddy, E.D.: Natural Language Processing. In: Encyclopedia of Library and Information Science, 2nd edn., Marcel Decker, Inc., New York (2003)

    Google Scholar 

  10. Liddy, E.D.: Scenario Based Question-Answer Systems. In: Presented at AQUAINT 2003 PI Meeting (2003), http://cnlp.org/presentations/present.asp?show=conference

  11. Patman, F., Thompson, P.: A New Frontier in Text Mining. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 27–38. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Raskin, V., Hempelmann, C., Triezenberg, K., Nirenburg, S.: Ontology in Information Security: a Useful Theoretical Foundation and Methodological Tool. Presented at 2001 Workshop on New Security Paradigms, pp. 53–59 (2001)

    Google Scholar 

  13. Sreenath, D.V., Grosky, W.I., Fotouhi, F.: Emergent Semantics from Users’ Browsing Paths. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 355–357. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Steinbach, M., Karypis, G., Kumar, V.: A comparison of document clustering techniques (2000), http://citeseer.nj.nec.com/steinbach00comparison.html

  15. Stolfo, S., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.: Behavior Profiling of Email. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 74–90. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Upadhyaya, S., Chinchani, R., K., K.: An Analytical Framework for Reasoning About Intrusions. Presented at 20th IEEE Symposium on Reliable Distributed Systems, pp. 99–108 (2001)

    Google Scholar 

  17. Ward Jr., J.H.: Hierarchical grouping to optimize an objective function. Journal of the American Statistical Association 58, 236–244 (1963)

    Article  MathSciNet  Google Scholar 

  18. Zhao, Y., Karypis, G.: Evaluation of Hierarchical Clustering Algorithms for Document Datasets (2002), http://citeseer.nj.nec.com/zhao02evaluation.html

  19. Zheng, R., Yi, O., Zan, H., Hsinchun, C.: Authorship Analysis in Cybercrime Investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 59–73. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. Zhou, L., Burgoon, J.K., Twitchell, D.P.: A Longitudinal Analysis of Language Behavior of Deception in E-mail. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 102–110. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Symonenko, S., Liddy, E.D., Yilmazel, O., Del Zoppo, R., Brown, E., Downey, M. (2004). Semantic Analysis for Monitoring Insider Threats. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25952-7_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22125-8

  • Online ISBN: 978-3-540-25952-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics