Show simple item record

dc.contributor.authorAlotibi, G
dc.contributor.authorClarke, Nathan
dc.contributor.authorLi, F
dc.contributor.authorFurnell, S
dc.date.accessioned2023-05-24T15:36:55Z
dc.date.available2023-05-24T15:36:55Z
dc.date.issued2019-08-24
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/20930
dc.description.abstract

Insider threat has become a serious issue to the many organizations. Various companies are increasingly deploying many information technologies to prevent unauthorized access to getting inside their system. Biometrics approaches have some techniques that contribute towards controlling the point of entry. However, these methods mainly are not able to continuously validate the users reliability. In contrast behavioral profiling is one of the biometrics technologies but it focusing on the activities of the users during using the system and comparing that with a previous history. This paper presents a comprehensive analysis, literature review and limitations on behavioral profiling approach and to what extent that can be used for mitigating insider misuse.

dc.format.extent59-71
dc.publisherAircc Publishing Corporation
dc.titleThe Feasibility of Using Behavioural Profiling Technique for Mitigating Insider Threats: Review
dc.typeconference
plymouth.conference-name5th International Conference on Computer Science, Information Technology
plymouth.publication-statusPublished
plymouth.journal5th International Conference on Computer Science, Information Technology (CSITEC 2019)
dc.identifier.doi10.5121/csit.2019.91106
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2019-01-01
dc.date.updated2023-05-24T15:36:55Z
dc.rights.embargodate2023-5-25
dc.rights.embargoperiodforever
rioxxterms.versionofrecord10.5121/csit.2019.91106


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV