Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts

CEAS(2006)

引用 28|浏览22
暂无评分
摘要
In this paper we detail the use of e-mail social network anal- ysis for the detection of security policy violations on com- puter systems. We begin by formalizing basic policies that derive from the expected social behavior of computer users. We then extract the social networks of three organizations by analyzing e-mail server logs collected over several months and apply the policies to the resultant social network and identify subsequent policy violators. After closer examination of the outlier accounts, we find that a significant fraction of the suspect accounts were sup- posed to have been terminated long ago for a variety of reasons. Through the analysis and experiments presented in the paper, we conclude the analysis of social networks extracted from network logs can prove useful in a variety of traditionally hard to solve security problems, such as de- tecting insider threats.
更多
查看译文
关键词
social network,security policy,social network analysis,social behavior
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要