Mitigating the Insider Threat with High-dimensional Anomaly Detection

ثبت نشده
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Insider Threat Detection Method Based on Business Process Mining

Currentintrusiondetectionsystemsaremostlyfordetectingexternalattacks,butthe“PrismDoor”and othersimilareventsindicatethatinternalstaffmaybringgreaterharmtoorganizationsininformation security.Traditional insider threatdetectionmethodsonlyconsider theaudit recordsofpersonal behaviorandfailedtocombineitwithbusinessactivities,whichmaymisstheins...

متن کامل

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Analysis of an organization’s computer network activity is a key component of early detection and mitigation of insider threat, a growing concern for many organizations. Raw system logs are a prototypical example of streaming data that can quickly scale beyond the cognitive power of a human analyst. As a prospective filter for the human analyst, we present an online unsupervised deep learning a...

متن کامل

Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data

Insider threat is a significant security risk for organizations, and detection of insider threat is of paramount concern to organizations. In this paper, we attempt to discover insider threat by analyzing enterprise social and online activity data of employees. To this end, we process and extract relevant features that are possibly indicative of insider threat behavior. This includes features e...

متن کامل

Outlier Detection in Random Subspaces over Data Streams: An Approach for Insider Threat Detection

Insider threat detection is an emergent concern for industries and governments due to the growing number of attacks in recent years. Several Machine Learning (ML) approaches have been developed to detect insider threats, however, they still suffer from a high number of false alarms. None of those approaches addressed the insider threat problem from the perspective of stream mining data where a ...

متن کامل

Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks

We present robust anomaly detection in multi-dimensional data. We describe information fusion across multiple levels in a layered architecture to ensure accurate and reliable detection of anomalies from heterogeneous data. We consider the problem of detecting anomalous entities (e.g., people) from observation data (e.g., activities) gathered from multiple contexts or information sources over ti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004