Insider threats: Identifying anomalous human behaviour in heterogeneous systems using beneficial intelligent software (Ben-ware)

  • Andrew Stephen McGough
  • , David Wall
  • , John Brennan
  • , Georgios Theodoropoulos
  • , Ed Ruck-Keene
  • , Budi Arief
  • , Carl Gamble
  • , John Fitzgerald
  • , Aad Van Moorsel
  • , Sujeewa Alwis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. We note that this behaviour may be malicious (for example, an employee is seeking to act against the best interest of the organisation by stealing confidential information) or benign (for example, an employee is applying some workaround to complete their job). To help distinguish between users who are intentionally malicious and those who are benign, we use human behaviour modelling along with Artificial Intelligence. Ben-ware has been developed as a distributed system comprising of probes for data collection, intermediate nodes for data routing and higher nodes for data analysis. This allows for real-time analysis with low impact on the overall infrastructure, which may contain legacy and low-power resources. We present an analysis of the appropriateness of the Ben-ware system for deployment within a large closed organisation, comprising of both new and legacy hardware, to protect its essential information. This analysis is performed in terms of the memory footprint, disk footprint and processing requirements of the different parts of the system.

Original languageEnglish
Title of host publicationMIST 2015 - Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, co-located with CCS 2015
PublisherAssociation for Computing Machinery
Pages1-12
Number of pages12
ISBN (Electronic)9781450338240
DOIs
Publication statusPublished - 16 Oct 2015
Event7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015 - Denver, United States
Duration: 12 Oct 2015 → …

Publication series

NameMIST 2015 - Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, co-located with CCS 2015

Conference

Conference7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015
Country/TerritoryUnited States
CityDenver
Period12/10/15 → …

Bibliographical note

Publisher Copyright:
© 2015 ACM.

Keywords

  • Anomalous behavior
  • Artificial intelligence
  • Assistive tool
  • Detection
  • Ethics
  • Human behaviour
  • Insider threats

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Insider threats: Identifying anomalous human behaviour in heterogeneous systems using beneficial intelligent software (Ben-ware)'. Together they form a unique fingerprint.

Cite this