ABSTRACT

In Chapter 26, we discussed our approach to insider threat detection. We represented the insiders and their communication as RDF graphs and then queried and mined the graphs to extract the nuggets. We also provided a comprehensive framework based on the cloud for insider threat detection.