首页> 外文会议>IEEE International Conference on Autonomic and Trusted Computing >Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling
【24h】

Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling

机译:我们能相信这个用户吗?通过YouTube使用剖析预测Insider的态度

获取原文

摘要

Addressing the insider threat is a major issue in cyber and corporate security in order to enhance trusted computing in critical infrastructures. In this paper we study the psychosocial perspective and the implications of insider threat prediction via social media, Open Source Intelligence and user generated content classification. Inductively, we propose a prediction method by evaluating the predisposition towards law enforcement and authorities, a personal psychosocial trait closely connected to the manifestation of malevolent insiders. We propose a methodology to detect users holding negative attitude towards authorities. For doing so, we facilitate a brief analysis of the medium (YouTube), machine learning techniques and a dictionary-based approach, in order to detect comments expressing negative attitude. Thus, we can draw conclusions over a user behavior and beliefs via the content the user generated within the limits a social medium. We also use an assumption free flat data representation technique in order to decide over the user's attitude and improve the scalability of our method. Furthermore, we compare the results of each method and highlight the common behavior and characteristics manifested by the users. As privacy violations may well-rise when using such methods, their use should be restricted only on exceptional cases, e.g. when appointing security officers or decision-making staff in critical infrastructures.
机译:解决内部威胁是网络和企业安全的一个主要问题,以便在关键基础设施中加强可信计算。在本文中,我们通过社交媒体研究了心理社会视角和内部威胁预测的影响,开源智能和用户生成的内容分类。感应地,我们通过评估执法和当局的倾向来提出预测方法,这是一个与恶毒内部人士的表现密切相关的个人心理社会特征。我们提出了一种方法来检测对当局持有负面态度的用户。为此,我们促进了对媒介(YouTube),机器学习技术和基于字典的方法的简要分析,以便检测表达负态度的评论。因此,我们可以通过在限制在社交媒体内的用户生成的内容来得出用户行为和信仰。我们还使用假设的免费平面数据表示技术,以便确定用户的态度并提高我们方法的可扩展性。此外,我们比较每个方法的结果,并突出用户表现出的共同行为和特征。由于隐私违规可能在使用此类方法时可能会升高,但它们的使用应仅限于特殊情况,例如,如此。在任命安全官员或决策员工时,在关键基础设施中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号