Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis
نویسندگان
چکیده
The cyber-security threat that most organisations face is not one that only resides outside their perimeter attempting to get in, but emanates from the inside too. Insider threats encompass anyone or thing which exploits authorised access to company information and resources to steal, corrupt or disrupt assets. Threat actors could include not only employees, but also contractors, trusted partners and in some cases clients. The nature of their access is usually persistent, as it is valid and required to conduct their roles, and as such, abuse of their privileges can pose a serious and real threat to the successful operation of the business. Whilst measures have been proposed for detecting previous attacks or those currently in progress, what would be much more desirable is to detect employees who are possibly becoming vulnerable to coercion or persuasion into conducting an attack of some form – enabling supportive or preventative action by the organisation to avoid escalation of an attack. Research into psychology and behaviour is indicating that it may be possible to detect such human vulnerability through analysis of language used – linguistics. In this paper we present a visual analytics tool for the assessment of sociolinguistic behaviours exhibited via e-mail communications, aimed at helping to identify people who are potentially at risk. We discuss the visual designs choices made to provide both detail and overview for the analyst for studying communications within a large group of users, and demonstrate this for a large real-world dataset of over 600 employees. We show how an analyst can use the tool to construct linguistic behavioural models to identify vulnerable employees. We propose that this approach could support wider insider threat prevention and detection systems.
منابع مشابه
Supporting Team-First Visual Analytics through Group Activity Representations
Collaborative visual analytics (CVA) involves sensemaking activities within teams of analysts based on coordination of work across team members, awareness of team activity, and communication of hypotheses, observations, and insights. We introduce a new type of CVA tools based on the notion of “team-first” visual analytics, where supporting the analytical process and needs of the entire team is ...
متن کاملMy OS Ought to Know Me Better: In-app Behavioural Analytics as an OS Service
What a user does in an app (e.g., viewing the menu of a restaurant or listening to the same song several times) is key to understanding user interests and preferences, and ultimately to enabling personalised experiences. This kind of behavioural analytics information, as we call it, is rarely used today (and if it is used, it remains siloed in one app). This paper makes a case for the OS to pro...
متن کاملQuality-aware visual data analysis
The quality, certainty, or confidence of decisions made during the visual analytics process depends on many factors, including the completeness and reliability of the initial data, information loss due to filtering, sampling, and other transformations, and the accuracy and clarity of the visual presentation. Unfortunately, in most visualization tools the analyst is unaware of these and other fo...
متن کاملVisual Search and Analysis in Complex Information Spaces – Approaches and Research Challenges
One of the central motivations for visual analytics research is the so-called information overload – implying the challenge for human users in understanding and making decisions in presence of too much information [37]. Visual-interactive systems, integrated with automatic data analysis techniques, can help in making use of such large data sets [35]. Visual Analytics solutions not only need to ...
متن کاملNonnegative matrix factorization for interactive topic modeling and document clustering
Nonnegative matrix factorization (NMF) approximates a nonnegative matrix by the product of two low-rank nonnegative matrices. Since it gives semantically meaningful result that is easily interpretable in clustering applications, NMF has been widely used as a clustering method especially for document data, and as a topic modeling method. We describe several fundamental facts of NMF and introduce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 4 شماره
صفحات -
تاریخ انتشار 2014