Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A benchmark for visual analysis of insider threat detection

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Glasser J, Lindauer B. Bridging the gap: a pragmatic approach to generating insider threat data. In: Proceedings of IEEE Security and Privacy Workshops, 2013. 98–104

  2. Grinstein G, Scholtz J, Whiting M, et al. VAST 2009 challenge: an insider threat. In: Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST), 2009. 243–244

  3. Salem M B, Stolfo S J. Modeling user search behavior for masquerade detection. In: Proceedings of International Workshop on Recent Advances in Intrusion Detection, Berlin, 2011. 181–200

  4. DuMouchel W, Ju W H, Karr A F, et al. Computer intrusion: detecting masquerades. Statist Sci, 2001, 16: 58–74

    Article  MathSciNet  MATH  Google Scholar 

  5. Camiña J B, Hernández-Gracidas C, Monroy R, et al. The windows-users and -intruder simulations logs dataset (WUIL): an experimental framework for masquerade detection mechanisms. Expert Syst Appl, 2014, 41: 919–930

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Key Research and Development Program of China (Grant No. 2018YFB1700403), National Natural Science Foundation of China (Grant Nos. 61872388, 62072470), and Natural Science Foundation of Hunan Province (Grant No. 2020JJ4758). ITD-2018 project at Github: https://github.com/csuvis/InsiderThreatData. Thanks all the organizers, reviewers, and participants of ChinaVis Data Challenge 2018.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siming Chen.

Supplementary File

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, Y., Yang, K., Chen, S. et al. A benchmark for visual analysis of insider threat detection. Sci. China Inf. Sci. 65, 199102 (2022). https://doi.org/10.1007/s11432-019-2776-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2776-4