Insider Threat Discovery Model for Vehicle Tracking

dc.contributor.advisorEloff, Jan H.P.
dc.contributor.emaildaniel.joubert@gmail.comen_ZA
dc.contributor.postgraduateJoubert, Daniel J.
dc.date.accessioned2019-07-31T08:19:47Z
dc.date.available2019-07-31T08:19:47Z
dc.date.created2019-09-03
dc.date.issued2019
dc.descriptionDissertation (MSc(Computer Science))--University of Pretoria, 2019.en_ZA
dc.description.abstractA number of simplistic and practical rule-based approaches are already in place to discover possible insider threat scenarios by using data from vehicle-tracking systems. Most of these approaches focus on known insider threat scenarios and are extended when unknown scenarios are discovered accidently or after extensive investigation. Thus, a significant landscape of insider threats scenarios remains undiscovered. Adding to this, insider threats find creative ways to inflate this undiscovered landscape. Another problem is that the cost associated with employing and training a sufficient number of people to work through the data records generated by vehicle-tracking devices is prohibitively high, if not impossible. Because of these problems, it is nearly impossible to calculate the total revenue and productivity loss as a result of insider threat activity in commercial fleets. Although various research studies indicate that anomaly detection is a valid generic approach to discover insider threats, there is unfortunately no practical evidence available to indicate that it has been used with success in a commercial environment. The current research set out to utilise anomaly detection – a field of study within data science and machine learning – to investigate irregularities in respect of vehicle-tracking data that may lead to the discovery of insider threats. Because vehicle-tracking providers have large datasets, it was suggested that Big Data be factored in with the process of discovering insider threats. The research in this document investigated the available data within the vehicle-tracking industry, general approaches towards the management of insider threats, and the application of anomaly detection to vehicle-tracking data. Based on this investigation, a prototype design was developed and applied to data from the vehicle-tracking industry. This application of the process model demonstrated that applying anomaly detection to vehicle-tracking data is a valid approach to discover insider threats. The research discussed here demonstrated that using anomaly detection to discover insider threats had both advantages and disadvantages. The advantages included amongst other, being able to find undiscovered insider threat activity, whereas the disadvantages were the complexity and time-consuming nature of the processes.en_ZA
dc.description.availabilityUnrestricteden_ZA
dc.description.degreeMSc(Computer Science)en_ZA
dc.description.departmentComputer Scienceen_ZA
dc.identifier.citation*en_ZA
dc.identifier.otherS2019en_ZA
dc.identifier.urihttp://hdl.handle.net/2263/70826
dc.language.isoenen_ZA
dc.publisherUniversity of Pretoria
dc.rights© 2019 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.
dc.subjectUCTDen_ZA
dc.subjectRKW890en_ZA
dc.titleInsider Threat Discovery Model for Vehicle Trackingen_ZA
dc.typeDissertationen_ZA

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
92. Dissertation.docx
Size:
21 MB
Format:
Microsoft Word XML
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: