作者
Bin Lv, Dan Wang, Yan Wang, Qiujian Lv, Dan Lu
发表日期
2018
研讨会论文
Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings 13
页码范围
333-344
出版商
Springer International Publishing
简介
Insider threats have shown their power by hugely affecting national security, financial stability, and the privacy of many people. A number of techniques have been proposed to detect insider threats by comparing behaviors among different individuals or by comparing the behaviors across different time periods of the same individual. However, both of them always fail to identify the certain kinds of inside threats due to the fact that the behaviors of insider threats are complex and diverse. To deal with this issue, this paper focuses on constructing a hybrid model to detect insider threats based on multi-dimensional features. First, an Across-Domain Anomaly Detection (ADAD) model is proposed to identify anomalous behaviors that deviate from the behaviors of their peers based on the isolation Forest algorithm. Second, an Across-Time Anomaly Detection (ATAD) model is proposed to measure the degree of …
引用总数
201820192020202120222023122327
学术搜索中的文章
B Lv, D Wang, Y Wang, Q Lv, D Lu - Wireless Algorithms, Systems, and Applications: 13th …, 2018