Abstract | ||
---|---|---|
In this paper we detail the use of e-mail social network anal- ysis for the detection of security policy violations on com- puter systems. We begin by formalizing basic policies that derive from the expected social behavior of computer users. We then extract the social networks of three organizations by analyzing e-mail server logs collected over several months and apply the policies to the resultant social network and identify subsequent policy violators. After closer examination of the outlier accounts, we find that a significant fraction of the suspect accounts were sup- posed to have been terminated long ago for a variety of reasons. Through the analysis and experiments presented in the paper, we conclude the analysis of social networks extracted from network logs can prove useful in a variety of traditionally hard to solve security problems, such as de- tecting insider threats. |
Year | Venue | Keywords |
---|---|---|
2006 | CEAS | social network,security policy,social network analysis,social behavior |
Field | DocType | Citations |
Organizational network analysis,World Wide Web,Social network,Computer security,Computer science,Social network analysis,Network security,Outlier,Insider,Suspect,Security policy | Conference | 6 |
PageRank | References | Authors |
0.58 | 7 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Adam J. O'Donnell | 1 | 69 | 4.93 |
Walter C. Mankowski | 2 | 12 | 2.78 |
Jeff Abrahamson | 3 | 48 | 6.07 |