The document presents an automated insider threat detection system designed to identify malicious activities within organizations by utilizing a tree-structure profiling approach based on user and role-based behavior. It highlights the inadequacies of traditional intrusion detection systems in detecting insider threats and proposes a method that assesses deviations in user behavior compared to their peers to identify anomalies. Additionally, the system integrates visual analytics tools to aid in further investigations, aiming to enhance organizational security amidst the growing concern of insider threats.
Related topics: