ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WRIT 2012 - Workshop on Research for Insider Threat

Date2012-05-24

Deadline2012-02-15

VenueSan Franci, USA - United States USA - United States

Keywords

Websitehttp://ieee-security.org/TC/SPW2012/

Topics/Call fo Papers

The Insider Threat (IT) problem has recently received increased attention in the academic, commercial and government research communities. Three reasons for this include: a) the IT problem typically involves attacks by trusted, as opposed to untrusted, individuals and hence remains outside the domain of many existing technical solutions; b) as technical security against remote attacks improve, access to valuable information systems by compromised insiders becomes a more attractive alternative; and, c) losses due to insider attacks in the financial and government sectors in particular have recently been significant and highly damaging.
The Workshop on Research for Insider Threat (WRIT) will highlight challenges specific to the IT problem, review existing promising approaches, and explore experimentation possibilities for evaluation of solution approaches. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. A moderated panel discussion will review and comment on the workshop presentations to provide a capstone activity.
The workshop is organized around the following structure:
Opening Remarks ? 15 minutes
Part 1: Unique Aspects of the Insider Threat (IT) Problem
Part 2: Technical Approaches to IT Prevention, Detection and Mitigation
Lunch
Part 2: Continued
Part 3: Experiments, Evaluation, and Datasets
Panel discussion and workshop summary
Topics of interest include but are not limited to:
- Insider Threat case studies and forensics in all relevant domains
- Unique aspects of the insider threat problem
- Techniques and technologies for preventing insider attacks
- Techniques and technologies for detecting insider attacks
- Techniques and technologies for responding to and mitigating insider attacks
- Anomaly analysis for insider threat detection
- Insider attacker behavioral models and analysis
- Adversarial and game theoretic models of insider threats and attacks
- Evaluation, experimentation and risk assessment of insider threat detection approaches

Last modified: 2012-02-09 18:36:49