1 |
Eldardiry, H., Sricharan, K., Liu, J., Hanley, J., Price, B., Brdiczka, O., and Bart, E., "Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks," JoWUA, Vol. 5, No. 2, pp. 39-58, 2014.
|
2 |
Financial Supervisory Service in Korea, http://www.fss.or.kr/promo/bodobbs_view.jsp?seqno=21371.
|
3 |
Grand Theft Data in McAfee, https://www.mcafee.com/enterprise/en-us/assets/reports/rp-data-exfiltration.pdf.
|
4 |
Guyon, I. and Elisseeff, A. An introduction to variable and feature selection, Journal of Machine Learning Research, Vol. 3, pp. 1157-1182, 2003.
|
5 |
Han, H. C., Kim, H. N., and Kim, H. K., "Fraud Detection System in Mobile Payment Service Using Data Mining," Journal of The Korea Institute of Information Security & Cryptology, Vol. 26, No. 6, 2016.
|
6 |
ISO/IEC/JTC1/SC27, ISO/IEC DTR 13335-1, Guidelines for the Management of IT Security-Part 1: Concepts and Models of IT Security.
|
7 |
ISO17799, What is ISO17799(the ISO Security Standard)?.
|
8 |
Jeong, S., H., Kim, H. N., Shin, Y. S., Lee, T. J., and Kim, H. K., “A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique,” Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 6, pp. 1525-1540, 2015.
DOI
|
9 |
Kim, H. D., Kim, J. H., Park, M. S., Cho, S. H., and Kang, P. S., “Insider Threat Detection based on User behavior Model and Novelty Detection Algorithms,” Journal of the Korean Institute of Industrial Engineers, Vol. 43, No. 4, pp. 276-287, 2017.
DOI
|
10 |
Duda, R. O., Hart, P. E., and Stork, D. G., Pattern classification: John Wiley & Sons, 2012.
|
11 |
Kim, Y. G. and Choi, J. Y., "A Study on the Korean company's readiness against to Insider Threat," Korea Computer Science Conference, pp. 1087-1089, 2017.
|
12 |
Liang, N. and Biros, D., "Validating Common Characteristics of Malicious Insiders: Proof of Concept Study, In System Sciences (HICSS)," 2016 49th Hawaii International Conference on (pp. 3716-3726), IEEE, Feb 2016.
|
13 |
Lunt, T. F., Jagannathan, R., Lee, R., Whitehurst, A., and Listgarten, S., "Knowledge-based intrusion detection," In AI Systems in Government Conference, Proceedings of the Annual (pp. 102-107). IEEE, 1989.
|
14 |
Mundie, D. A. Perl, S., and Huth, C. L., "Toward an ontology for insider threat research: Varieties of insider threat definitions," In Socio-Technical Aspects in Security and Trust (STAST), 2013 Third Workshop on (pp. 26-36), IEEE, Oct 2013.
|
15 |
Na, O. C. and Chang, H. B., “Security Knowledge Classification Framework for Future Intelligent Environment,” The Journal of Society for e-Business Studies, Vol. 20, No. 3, pp. 47-58, 2015.
DOI
|
16 |
Park, E. Y. and Yoon, J. W., “A Study of Accident Prevention Effect through Anomaly Analysis in E-Banking,” The Journal of Society for e-Business Studies, Vol. 19, No. 4, pp. 119-134, 2014.
DOI
|
17 |
Ponemen Institute, 2017 Global Study on Application Security May 2017.
|
18 |
Shin, H. W., "Methodology to analyze insider risk for the prevention of corporate data leakage," Korea Computer Science Conference, Vol. 39, No. 1(C), 2012.
|
19 |
Theoharidou, M., Kokolakis, S., Karyda, M., and Kiountouzis, E., "The insider threat to information systems and the effectiveness of ISO17799," Computers & Security, Vol. 24, No. 6, pp. 472-484, 2005.
DOI
|
20 |
Ted, E., Goldberg, H. G. Memory, A., Young, W. T. Rees, B, Pierce, R., and Essa, I. Detecting insider threats in a real corporate database of computer usage activity, In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1393-1401), ACM, 2013.
|
21 |
Alpaydin, E., Introduction to Machine Learning, Second edition, MIT Press, Cambridge, Massachusetts, 2014.
|
22 |
Choi, E. S. and Lee, K. H., "A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 3, Jun, 2015.
|
23 |
Data Breach Investigations Report 2015, https://enterprise.verizon.com/resources/reports/dbir.
|