Title
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
Abstract
In this paper we detail the use of e-mail social network anal- ysis for the detection of security policy violations on com- puter systems. We begin by formalizing basic policies that derive from the expected social behavior of computer users. We then extract the social networks of three organizations by analyzing e-mail server logs collected over several months and apply the policies to the resultant social network and identify subsequent policy violators. After closer examination of the outlier accounts, we find that a significant fraction of the suspect accounts were sup- posed to have been terminated long ago for a variety of reasons. Through the analysis and experiments presented in the paper, we conclude the analysis of social networks extracted from network logs can prove useful in a variety of traditionally hard to solve security problems, such as de- tecting insider threats.
Year
Venue
Keywords
2006
CEAS
social network,security policy,social network analysis,social behavior
Field
DocType
Citations 
Organizational network analysis,World Wide Web,Social network,Computer security,Computer science,Social network analysis,Network security,Outlier,Insider,Suspect,Security policy
Conference
6
PageRank 
References 
Authors
0.58
7
3
Name
Order
Citations
PageRank
Adam J. O'Donnell1694.93
Walter C. Mankowski2122.78
Jeff Abrahamson3486.07