Research on insider threat detection method based on variational autoencoding

被引:0
|
作者
Zhang, Zhenjiang [1 ]
Zhao, Lulu [1 ]
Zhang, Yang [1 ]
Zhou, Hongde [1 ]
Li, Wei [2 ]
机构
[1] Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing100044, China
[2] Beijing Topsec Co., Ltd., Beijing,100193, China
关键词
Business operation - Feature engineerings - Feature extraction methods - Insider threat detections - Internal attacks - Long and short term memory - Threat detection - Time characteristics;
D O I
10.53106/199115992021083204016
中图分类号
学科分类号
摘要
引用
收藏
页码:201 / 210
相关论文
共 50 条
  • [1] An insider threat detection method based on business process mining
    Zhu, Taiming
    Guo, Yuanbo
    Ju, Ankang
    Ma, Jun
    Wang, Xuan
    International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
  • [2] An Insider Threat Detection Method Based on User Behavior Analysis
    Jiang, Wei
    Tian, Yuan
    Liu, Weixin
    Liu, Wenmao
    INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 421 - 429
  • [3] Research Opportunity of Insider Threat Detection based on Machine Learning Methods
    Prajitno, Noer Tjahja Moekthi
    Hadiyanto, H.
    Rochim, Adian Fatchur
    2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, : 292 - 296
  • [4] A Graph Convolution Neural Network Based Method for Insider Threat Detection
    Fei, Kexiong
    Zhou, Jiang
    Su, Lin
    Wang, Weiping
    Chen, Yong
    Zhang, Fan
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 66 - 73
  • [5] Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks
    Pantelidis, Efthimios
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 129 - 134
  • [6] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [7] An Effective Insider Threat Detection Apporoach Based on BPNN
    Tao, Xiaoling
    Liu, Runrong
    Fu, Lianyou
    Qiu, Qiqi
    Yu, Yuelin
    Zhang, Haijing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 231 - 243
  • [8] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [9] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [10] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,