作者
Qiujian Lv, Yan Wang, Leiqi Wang, Dan Wang
发表日期
2018/8/22
研讨会论文
2018 international conference on network infrastructure and digital content (IC-NIDC)
页码范围
6-10
出版商
IEEE
简介
Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Existing methods have distinguished the minority of users who show suspicious behavior from the majority of users. However, these methods failed to apply the features reflecting the deviation between the behaviors of users and those of their user groups within the similar job roles. This paper focuses on insider threat detection by conducting both user and role behaviors analysis. It extracts multiple features that represent the details of activities conducted by each user and their deviations from the behaviors of their user groups. The malicious users are then detected by using an unsupervised algorithm, Isolation Forest Algorithm, which evaluates the variance that each user exhibits across multiple attributes, compared against the other users. To evaluate the performance of the proposed models …
引用总数
20202021202220234234
学术搜索中的文章
Q Lv, Y Wang, L Wang, D Wang - 2018 international conference on network infrastructure …, 2018