Research on insider threat detection method based on variational autoencoding

被引:0
|
作者
Zhang, Zhenjiang [1 ]
Zhao, Lulu [1 ]
Zhang, Yang [1 ]
Zhou, Hongde [1 ]
Li, Wei [2 ]
机构
[1] Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing100044, China
[2] Beijing Topsec Co., Ltd., Beijing,100193, China
关键词
Business operation - Feature engineerings - Feature extraction methods - Insider threat detections - Internal attacks - Long and short term memory - Threat detection - Time characteristics;
D O I
10.53106/199115992021083204016
中图分类号
学科分类号
摘要
引用
收藏
页码:201 / 210
相关论文
共 50 条
  • [31] An integrated system for insider threat detection
    Ray, Daniel
    Bradford, Phillip
    ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 75 - +
  • [32] A Tripwire Grammar for Insider Threat Detection
    Agrafiotis, Ioannis
    Erola, Arnau
    Goldsmith, Michael
    Creese, Sadie
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 105 - 108
  • [33] Machine Learning for Insider Threat Detection
    Naicker, Tristan Sashlen
    van Niekerk, Brett
    PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, : 122 - 131
  • [34] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat
    Legg, Philip A.
    Buckley, Oliver
    Goldsmith, Michael
    Creese, Sadie
    2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [35] Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms
    Kim, Junhong
    Park, Minsik
    Kim, Haedong
    Cho, Suhyoun
    Kang, Pilsung
    APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [36] Scenario-Based Insider Threat Detection From Cyber Activities
    Chattopadhyay, Pratik
    Wang, Lipo
    Tan, Yap-Peng
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 660 - 675
  • [37] Experimental Evaluation of Insider Threat Detection Methods Based on Temporal Representation
    Lu, Gaole
    Zhang, Huixiang
    Liu, Tianluo
    Liao, Kaihua
    Feng, Chun
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 682 - 688
  • [38] Insider threat detection based on deep belief network feature representation
    Lin, Lingli
    Zhong, Shangping
    Jia, Cunmin
    Chen, Kaizhi
    2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI), 2017, : 54 - 59
  • [39] A graph empowered insider threat detection framework based on daily activities
    Hong, Wei
    Yin, Jiao
    You, Mingshan
    Wang, Hua
    Cao, Jinli
    Li, Jianxin
    Liu, Ming
    Man, Chengyuan
    ISA TRANSACTIONS, 2023, 141 : 84 - 92
  • [40] An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
    Hu, Teng
    Niu, Weina
    Zhang, Xiaosong
    Liu, Xiaolei
    Lu, Jiazhong
    Liu, Yuan
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019