14.1 Introduction

There is a growing consensus within the intelligence community that malicious insiders are perhaps the most potent threats to information assurance in many or most organizations ([BRAC04], [HAMP99], [MATZ04], [SALE11]). One traditional approach to the insider threat detection problem is supervised learning, which builds data classification models from training data. Unfortunately, the training process for supervised learning methods tends to be time-consuming and expensive, and generally requires large amounts of well-balanced training data to be effective. In our experiments, we observe that <3% of the data in realistic datasets for this problem is associated with insider ...

Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.