Research on insider threat detection method based on variational autoencoding

被引:0
|
作者
Zhang, Zhenjiang [1 ]
Zhao, Lulu [1 ]
Zhang, Yang [1 ]
Zhou, Hongde [1 ]
Li, Wei [2 ]
机构
[1] Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing100044, China
[2] Beijing Topsec Co., Ltd., Beijing,100193, China
关键词
Business operation - Feature engineerings - Feature extraction methods - Insider threat detections - Internal attacks - Long and short term memory - Threat detection - Time characteristics;
D O I
10.53106/199115992021083204016
中图分类号
学科分类号
摘要
引用
收藏
页码:201 / 210
相关论文
共 50 条
  • [21] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [22] Insider Threat Detection Based on Adaptive Optimization by Grid Search
    Zhang, Jiange
    Chen, Yue
    Yang, Kuiwu
    Zhao, Jian
    Yan, Xincheng
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 173 - 175
  • [23] Behavioral Based Insider Threat Detection Using Deep Learning
    Nasir, Rida
    Afzal, Mehreen
    Latif, Rabia
    Iqbal, Waseem
    IEEE ACCESS, 2021, 9 : 143266 - 143274
  • [24] Insider Threat Detection Based On Heterogeneous Graph Neural Network
    Tian, Tian
    Gong, Yiru
    Jiang, Bo
    Liu, Junrong
    Feng, Huamin
    Lu, Zhigang
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 628 - 635
  • [25] Insider Threat Detection Using Graph-Based Approaches
    Eberle, William
    Holder, Lawrence
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 237 - +
  • [26] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
  • [27] Weak models for insider threat detection
    Thompson, P
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
  • [28] Review on Insider Threat Detection Techniques
    Oladimeji, T. O.
    Ayo, C. K.
    Adewumi, S. E.
    3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
  • [29] Insider Threat Detection and Cloud Computing
    Choudhary, Arjun
    Bhadada, Rajesh
    ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
  • [30] Analytics for early detection of insider threat
    Fenstermacher, Laurie
    Larson, Kathleen
    Vitiello, Christine
    Shellman, Steve
    Levey, Brian
    SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122