Insider Threat Detection and Prevention Protocol: ITDP
Keywords:Insider threat, question-answering, computer usage behavior, rough set, binary logistic regression
Insider threat is a severe problem of many computer department since they have an authorized to do some assigned tasks. They can easily seek for any organizational computer security vulnerability. Protocol “Insider threat detection and prevention Protocol: ITDP” is designed to detect if a requesting “IT user” is authentic IT user whom has been allocated rights to particular application. User’s knowledge and his behavior are used to classify whether he is a real identified IT user or not. Statistical classification technique is used to predict if the guest is authentic. Best classification technique is linear binary discriminant function analysis with 98.3 percentage of accuracy in insider threat detection classification.
How to Cite
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.