Skip to main content

Research Repository

Advanced Search

Outputs (4)

Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour (2015)
Journal Article
McGough, A. S., Arief, B., Gamble, C., Wall, D., Brennan, J., Fitzgerald, J., …Ruck-Keene, E. (2015). Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of wireless mobile networks, ubiquitous computing and dependable applications, 6(4), 1-44

The insider threat problem is a significant and ever present issue faced by any organisation. While security mechanisms can be put in place to reduce the chances of external agents gaining access to a system, either to steal assets or alter records,... Read More about Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour.

Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain (2015)
Conference Proceeding
Bonner, S., McGough, S., Kureshi, I., Brennan, J., Theodoropoulos, G., Moss, L., …Antoniou, G. (2015). Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain. In Proceedings, 2015 IEEE International Conference on Big Data : Oct 29-Nov 01, 2015, Santa Clara, CA, USA (737-746). https://doi.org/10.1109/bigdata.2015.7363818

Recent technological advances in modern healthcare have lead to the ability to collect a vast wealth of patient monitoring data. This data can be utilised for patient diagnosis but it also holds the potential for use within medical research. However,... Read More about Data Quality Assessment and Anomaly Detection Via Map / Reduce and Linked Data: A Case Study in the Medical Domain.

PBStoHTCondor system for campus grids (2015)
Conference Proceeding
Brennan, J., Holmes, V., Bonner, S., & Kureshi, I. (2015). PBStoHTCondor system for campus grids. In Proceedings of 2015 Science and Information Conference (SAI) : July 28-30, 2015, London, United Kingdom (55-61). https://doi.org/10.1109/sai.2015.7237126

The campus grid architectures currently available are considered to be overly complex. We have focused on High Throughput Condor HTCondor as one of the most popular middlewares among UK universities, and are proposing a new system for unifying campus... Read More about PBStoHTCondor system for campus grids.

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware) (2015)
Conference Proceeding
McGough, A. S., Wall, D., Brennan, J., Theodoropoulos, G., Ruck-Keene, E., Arief, B., …van Moorsel, A. (2015). Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). In 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST '15, 12-16 October 2015, Denver, Colorado ; proceedings (1-12). https://doi.org/10.1145/2808783.2808785

In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure. We note that this behaviour may be malicious (for example, an emp... Read More about Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).