{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:21:43Z","timestamp":1730319703781,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139923.3139935","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T14:58:58Z","timestamp":1509461938000},"page":"93-96","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Insider Threat Mitigation Using Moving Target Defense and Deception"],"prefix":"10.1145","author":[{"given":"Hassan","family":"Takabi","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"J. Haadi","family":"Jafarian","sequence":"additional","affiliation":[{"name":"University of Colorado Denver, Denver, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"showURL%\"http:\/\/www.algosec.com","author":"AlgoSec 2014. AlgoSec Survey:State of Network Security 2014.","year":"2014","unstructured":"AlgoSec 2014. AlgoSec Survey:State of Network Security 2014. ( 2014 ). showURL%\"http:\/\/www.algosec.com \" AlgoSec 2014. AlgoSec Survey:State of Network Security 2014. (2014). showURL%\"http:\/\/www.algosec.com\""},{"key":"e_1_3_2_1_2_1","volume-title":"Challenges and Directions Sixth International Workshop on Constraints in Formal Verification Grenoble, France.","author":"Bj\u00f8rner Nikolaj","year":"2009","unstructured":"Nikolaj Bj\u00f8rner and Leonardo de Moura 2009 . $Z3^10$: Applications, Enablers , Challenges and Directions Sixth International Workshop on Constraints in Formal Verification Grenoble, France. Nikolaj Bj\u00f8rner and Leonardo de Moura 2009. $Z3^10$: Applications, Enablers, Challenges and Directions Sixth International Workshop on Constraints in Formal Verification Grenoble, France."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2009.5411968"},{"volume-title":"Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. Insider Threats in Cyber Security","author":"Greitzer Frank L","key":"e_1_3_2_1_4_1","unstructured":"Frank L Greitzer and Deborah A Frincke 2010. Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. Insider Threats in Cyber Security . Springer , 85--113. Frank L Greitzer and Deborah A Frincke 2010. Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. Insider Threats in Cyber Security. Springer, 85--113."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.309"},{"key":"e_1_3_2_1_6_1","unstructured":"Vincent C. Hu David Ferraiolo Rick Kuhn Adam Schnitzer Kenneth Sandlin Robert Miller and Karen Scarfone 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (2014). Vincent C. Hu David Ferraiolo Rick Kuhn Adam Schnitzer Kenneth Sandlin Robert Miller and Karen Scarfone 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (2014)."},{"key":"e_1_3_2_1_7_1","first-page":"4","volume":"2","author":"Hunker Jeffrey","year":"2011","unstructured":"Jeffrey Hunker and Christian W Probst 2011 . Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques. JoWUA , Vol. 2 , 1 (2011), 4 -- 27 . Jeffrey Hunker and Christian W Probst 2011. Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques. JoWUA, Vol. 2, 1 (2011), 4--27.","journal-title":"JoWUA"},{"key":"e_1_3_2_1_8_1","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats (bibinfoedition","author":"Jajodia Sushil","unstructured":"Sushil Jajodia , Anup K. Ghosh , Vipin Swarup , Cliff Wang , and X. Sean Wang 2011. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats (bibinfoedition 1 st ed.). Springer Publishing Company, Inc orporated. Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang 2011. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats (bibinfoedition1st ed.). Springer Publishing Company, Incorporated.","edition":"1"},{"key":"e_1_3_2_1_9_1","first-page":"19","article-title":"Toward an Insider Threat Detection Framework Using Honey Permissions","volume":"5","author":"Kaghazgaran Parisa","year":"2015","unstructured":"Parisa Kaghazgaran and Hassan Takabi 2015 . Toward an Insider Threat Detection Framework Using Honey Permissions . Journal of Internet Services and Information Security (JISIS) , Vol. 5 , 3 (2015), 19 -- 36 . Parisa Kaghazgaran and Hassan Takabi 2015. Toward an Insider Threat Detection Framework Using Honey Permissions. Journal of Internet Services and Information Security (JISIS), Vol. 5, 3 (2015), 19--36.","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"e_1_3_2_1_10_1","unstructured":"Ponemon Institute LLC. 2016. Cost of Cyber Crime 2016: Reducing the Risk of Business Innovation. (2016). showURL%https:\/\/saas.hpe.com\/en-us\/marketing\/cyber-crime-risk-to-business-innovation Ponemon Institute LLC. 2016. Cost of Cyber Crime 2016: Reducing the Risk of Business Innovation. (2016). showURL%https:\/\/saas.hpe.com\/en-us\/marketing\/cyber-crime-risk-to-business-innovation"},{"volume-title":"Formal Methods: Foundations and Applications","author":"Moura Leonardo","key":"e_1_3_2_1_11_1","unstructured":"Leonardo Moura and Nikolaj Bj\u00f8rner 2009. Formal Methods: Foundations and Applications . Springer-Verlag , Berlin, Heidelberg , Chapter Satisfiability Modulo Theories: An Appetizer, 23--36. https:\/\/doi.org\/10.1007\/978--3--642--10452--7_3 10.1007\/978--3--642--10452--7_3 Leonardo Moura and Nikolaj Bj\u00f8rner 2009. Formal Methods: Foundations and Applications. Springer-Verlag, Berlin, Heidelberg, Chapter Satisfiability Modulo Theories: An Appetizer, 23--36. https:\/\/doi.org\/10.1007\/978--3--642--10452--7_3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414511"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","volume":"173","author":"Niels","unstructured":"Niels Provos et almbox. 2004. A Virtual Honeypot Framework .. In USENIX Security Symposium , Vol. Vol. 173 . Niels Provos et almbox. 2004. A Virtual Honeypot Framework.. In USENIX Security Symposium, Vol. Vol. 173."},{"key":"e_1_3_2_1_15_1","volume-title":"Common sense guide to mitigating insider threats","author":"Silowash George","unstructured":"George Silowash , Dawn Cappelli , Andrew Moore , Randall Trzeciak , Timothy J Shimeall , and Lori Flynn 2012. Common sense guide to mitigating insider threats 4 th edition. bibinfotypeTechnical Report. bibinfoinstitutionDTIC Document . George Silowash, Dawn Cappelli, Andrew Moore, Randall Trzeciak, Timothy J Shimeall, and Lori Flynn 2012. Common sense guide to mitigating insider threats 4th edition. bibinfotypeTechnical Report. bibinfoinstitutionDTIC Document.","edition":"4"},{"key":"e_1_3_2_1_16_1","unstructured":"SolarWinds. 2015. SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity. (2015). showURL%http:\/\/www.solarwinds.com\/company\/newsroom\/press_releases\/threats_to_federal_cybersecurity.aspx SolarWinds. 2015. SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity. (2015). showURL%http:\/\/www.solarwinds.com\/company\/newsroom\/press_releases\/threats_to_federal_cybersecurity.aspx"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.05.002"},{"key":"e_1_3_2_1_18_1","volume-title":"Weak models for insider threat detection","author":"Thompson Paul","year":"2004","unstructured":"Paul Thompson . 2004. Weak models for insider threat detection . International Society for Optics and Photonics ,Defense and Security ( 2004 ), 40--48. Paul Thompson. 2004. Weak models for insider threat detection. International Society for Optics and Photonics,Defense and Security (2004), 40--48."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings from the Fifth Annual IEEE SMC. IEEE, 116--122","author":"Yuill Jim","year":"2004","unstructured":"Jim Yuill , Mike Zappe , Dorothy Denning , and Fred Feer . 2004 . Honeyfiles: deceptive files for intrusion detection Information Assurance Workshop, 2004 . Proceedings from the Fifth Annual IEEE SMC. IEEE, 116--122 . endthebibliography Jim Yuill, Mike Zappe, Dorothy Denning, and Fred Feer. 2004. Honeyfiles: deceptive files for intrusion detection Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC. IEEE, 116--122. endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 International Workshop on Managing Insider Security Threats"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139923.3139935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:04:01Z","timestamp":1672963441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139923.3139935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":18,"alternative-id":["10.1145\/3139923.3139935","10.1145\/3139923"],"URL":"https:\/\/doi.org\/10.1145\/3139923.3139935","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}