In the previous post we examined few of the published insider attacks over the current decade. In this post we attempt to mine, extract and classify patterns associated with these threats with intent to automate insider misuse detection methods.

Related Articles