{"id":1173,"date":"2023-05-30T15:55:14","date_gmt":"2023-05-30T19:55:14","guid":{"rendered":"https:\/\/sites.mitre.org\/capstones\/?p=1173"},"modified":"2023-05-31T10:36:37","modified_gmt":"2023-05-31T14:36:37","slug":"detection-of-insider-threat-through-osint","status":"publish","type":"post","link":"https:\/\/sites.mitre.org\/capstones\/2023\/05\/detection-of-insider-threat-through-osint\/","title":{"rendered":"Detection of Insider Threat through OSINT"},"content":{"rendered":"\n<p>Title: Detection of Insider Threat through OSINT<br \/>\nProject ID: YnQhu17<br \/>\nDomain(s): Artificial Intelligence,Cybersecurity,Machine Learning,Multidisciplinary<\/p>\n<p>Description:<\/p>\n<p>Expand the research that started with the original research started in the peer-reviewed article: <\/p>\n<p>&#8220;A Survey of Unintentional Insider Threat Category&#8221;, which is published at https:\/\/ijcsit.com\/ijcsit-v14issue2.php.<\/p>\n<p>Conduct a literature review of current AI\/ML insider threat detection approaches.<\/p>\n<p>Use Open Source Intelligence (OSINT) to search any available open sources for individuals that may become insider threats. <\/p>\n<p>Clearly define where possible a medical insider threat case versus a psychological case when possible.<\/p>\n<p>Write about what new AI\/ML detection techniques can be created as they are discovered and any gaps.<\/p>\n<p>Desired Skills:<br \/>\nResearch Skills<br \/>\nWriting Skills<br \/>\nFamiliarity with AI\/ML<br \/>\nFamiliarity with Cybersecurity<br \/>\nFamiliarity with Open Source Intelligence (OSINT)<\/p>\n<h3>Clearance-<\/h3>\n<p>US Citizenship Required: No<br \/>\nActive Clearance or Background Investigation Required: No<br \/>\nLevel Needed: <\/p>\n<h3>Team Information-<\/h3>\n<p>Targeted Students: Grad,Undergrad<br \/>\nTeam Size: 2 to 4<br \/>\nDetails: Recommend three to four students to split up the research and collaborate on the topic. May require individual team members to do more of a deep dive into a certain area and then brief the rest of the team or write about the topic.<\/p>\n<h3>Specific Requirements-<\/h3>\n<p>Focus on Particular University: No<br \/>\nDetails: <\/p>\n<h3>Timeline-<\/h3>\n<p>Focus Timeline: No<br \/>\nDetails: <\/p>\n<h3>Funding-<\/h3>\n<p>Potential Funding:No<br \/>\nNote: Availability of funds not guaranteed<\/p>\n<p><br \/>\n<a href=\"https:\/\/sites.mitre.org\/capstones\/interest?PT=Detection of Insider Threat through OSINT&amp;PID=YnQhu17&amp;POC=jslaughter@mitre.org\" style=\"background-color:#07648d;color: white;font-weight: bold;padding: 14px 25px;text-align: center;float:right\">I&#8217;m Interested In this Project<\/a><\/p>\n<p><br \/>\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Expand the research that started with the original research started in the peer-reviewed article: <\/p>\n<p>&#8220;A Survey of Unintentional Insider Threat Category&#8221;, which is published at https:\/\/ijcsit.com\/ijcsit-v14issue2.php.<\/p>\n<p>Conduct a literature review of current AI\/ML insider threat detection approaches.<\/p>\n<p>Use Open Source Intelligence (OSINT) to search any available open sources for individuals that may become insider threats. <\/p>\n<p>Clearly define where possible a medical insider threat case versus a psychological case when possible.<\/p>\n<p>Write about what new AI\/ML detection techniques can be created as they are discovered and any gaps.<\/p>\n","protected":false},"author":913,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[11],"tags":[32,24,33,13],"class_list":["post-1173","post","type-post","status-publish","format-standard","hentry","category-capstone","tag-artificial-intelligence","tag-cyber","tag-and-machine-learning","tag-multidisciplinary"],"acf":[],"_links":{"self":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts\/1173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/users\/913"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/comments?post=1173"}],"version-history":[{"count":1,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts\/1173\/revisions"}],"predecessor-version":[{"id":1176,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/posts\/1173\/revisions\/1176"}],"wp:attachment":[{"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/media?parent=1173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/categories?post=1173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.mitre.org\/capstones\/wp-json\/wp\/v2\/tags?post=1173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}