Research on insider threat detection method based on variational autoencoding

被引:0
|
作者
Zhang, Zhenjiang [1 ]
Zhao, Lulu [1 ]
Zhang, Yang [1 ]
Zhou, Hongde [1 ]
Li, Wei [2 ]
机构
[1] Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing100044, China
[2] Beijing Topsec Co., Ltd., Beijing,100193, China
关键词
Business operation - Feature engineerings - Feature extraction methods - Insider threat detections - Internal attacks - Long and short term memory - Threat detection - Time characteristics;
D O I
10.53106/199115992021083204016
中图分类号
学科分类号
摘要
引用
收藏
页码:201 / 210
相关论文
共 50 条
  • [41] Insider Threat Detection Based on NLP Word Embedding and Machine Learning
    Haq, Mohd Anul
    Khan, Mohd Abdul Rahim
    Alshehri, Mohammed
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (01): : 619 - 635
  • [42] Anomaly-based Insider Threat Detection using Deep Autoencoders
    Liu, Liu
    De Vel, Olivier
    Chen, Chao
    Zhang, Jun
    Xiang, Yang
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 39 - 48
  • [43] Image-Based Insider Threat Detection via Geometric Transformation
    Li, Dongyang
    Yang, Lin
    Zhang, Hongguang
    Wang, Xiaolei
    Ma, Linru
    Xiao, Junchao
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification
    Kim D.-W.
    Shin G.-Y.
    Han M.-M.
    Computer Systems Science and Engineering, 2023, 46 (01): : 153 - 164
  • [45] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 100 - 107
  • [46] The Trend of the Security Research for the Insider Cyber Threat
    Hong, Jaeseung
    Kim, Jongwung
    Cho, Jeonghun
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2010, 3 (02): : 31 - 40
  • [47] Research on Security Architecture for Defending Insider Threat
    Wang, Hui
    Xu, Heli
    Lu, Bibo
    Shen, Zihao
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 30 - 33
  • [48] Probabilistic Modeling of Insider Threat Detection Systems
    Ruttenberg, Brian
    Blumstein, Dave
    Druce, Jeff
    Howard, Michael
    Reed, Fred
    Wilfong, Leslie
    Lister, Crystal
    Gaskin, Steve
    Foley, Meaghan
    Scofield, Dan
    GRAPHICAL MODELS FOR SECURITY, 2018, 10744 : 91 - 98
  • [49] A benchmark for visual analysis of insider threat detection
    Ying Zhao
    Kui Yang
    Siming Chen
    Zhuo Zhang
    Xin Huang
    Qiusheng Li
    Qi Ma
    Xinyue Luan
    Xiaoping Fan
    Science China Information Sciences, 2022, 65
  • [50] Insider Threat Detection and Prevention Protocol: ITDP
    Sawatnatee, Amnat
    Prakancharoen, Somchai
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2021, 17 (02) : 69 - 89