Research Assistant: Tugkan Tuglular
Sponsor: COAST Laboratory sponsors
Computer systems may be abused by outsiders (intrusion), or by authorized users acting outside the scope of their authority. Although the problem of insider misuse has been shown to be more widespread, most reseach in the last few decades has been focused on intrusion detection techniques. Our goal is to attempt to characterize misusers and their behavior in a way that will lead to insight about how to detect and prevent insider misuse of computer systems.