This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2013 IEEE CS Security and Privacy Workshops (SPW2013)
San Francisco, CA USA
May 23-May 24
ISBN: 978-1-4799-0458-7
Joshua Glasser, ExactData, LLC, Rochester, NY, USA
Brian Lindauer, Software Eng. Inst., Carnegie Mellon Univ., Pittsburgh, PA, USA
The threat of malicious insider activity continues to be of paramount concern in both the public and private sectors. Though there is great interest in advancing the state of the art in predicting and stopping these threats, the difficulty of obtaining suitable data for research, development, and testing remains a significant hinderance. We outline the use of synthetic data to enable progress in one research program, while discussing the benefits and limitations of synthetic insider threat data, the meaning of realism in this context, as well as future research directions.
Index Terms:
Testing,Social network services,Organizations,Topology,Generators,Data privacy,Data models,Modeling and Simulation,Insider Threat,Synthetic Data
Citation:
Joshua Glasser, Brian Lindauer, "Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data," spw, pp.98-104, 2013 IEEE CS Security and Privacy Workshops (SPW2013), 2013
Usage of this product signifies your acceptance of the Terms of Use.