Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Visual analytics of e-mail sociolinguistics for user behavioural analysis
Legg, Philip; Buckley, Oliver; Goldsmith, Michael; Creese, Sadie
Authors
Oliver Buckley
Michael Goldsmith
Sadie Creese
Abstract
The cyber-security threat that most organisations face is not one that only resides outside their perimeter attempting to get in, but emanates from the inside too. Insider threats encompass anyone or thing which exploits authorised access to company information and resources to steal, corrupt or disrupt assets. Threat actors could include not only employees, but also contractors, trusted partners and in some cases clients. The nature of their access is usually persistent, as it is valid and required to conduct their roles, and as such abuse of their privileges can pose a serious and real threat to the successful operation of the business. Whilst measures have been proposed for detecting previous attacks or those currently in progress, what would be much more desirable is to detect employees who are possibly becoming vulnerable to coercion or persuasion into conducting an attack of some form – enabling supportive or preventative action by the organisation to avoid escalation of an attack. Research into psychology and behaviour is indicating that it may be possible to detect such human vulnerability through analysis of language used – linguistics. In this paper we present a visual an- alytics tool for the assessment of sociolinguistic behaviours exhibited via e-mail communications, aimed at helping to identify people who are potentially at risk. We discuss the visual designs choices made to provide both detail and overview for the analyst for studying communications within a large group of users, and demonstrate this using a large real-world dataset of over 600 employees. We also show how an analyst can use the tool to construct linguistic behavioural models to identify vulner- able employees. We expect this approach to support wider insider threat prevention and detection systems.
Journal Article Type | Article |
---|---|
Publication Date | Nov 1, 2014 |
Deposit Date | Jun 23, 2015 |
Journal | Journal of Internet Services and Information Security |
Print ISSN | 2182-2069 |
Peer Reviewed | Peer Reviewed |
Volume | 4 |
Issue | 4 |
Pages | 1-13 |
Keywords | visual analytics, e-mail, sociolinguistics |
Public URL | https://uwe-repository.worktribe.com/output/808376 |
Publisher URL | http://isyou.info/jisis/vol4/no4/1.htm |
Contract Date | Feb 9, 2016 |
You might also like
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
(2015)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search