BRITD: behavior rhythm insider threat detection with time awareness and user adaptation

S Song, N Gao, Y Zhang, C Ma - Cybersecurity, 2024 - Springer
Researchers usually detect insider threats by analyzing user behavior. The time information
of user behavior is an important concern in internal threat detection. Existing works on …

Itdbert: Temporal-semantic representation for insider threat detection

W Huang, H Zhu, C Li, Q Lv, Y Wang… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
The objective and universal nature of user behavior data make it the primary data for insider
threat detection. Existing solutions treat user behavior as atomic symbols and do not …

Insider threat detection with deep neural network

F Yuan, Y Cao, Y Shang, Y Liu, J Tan… - … Science–ICCS 2018: 18th …, 2018 - Springer
Insider threat detection has attracted a considerable attention from the researchers and
industries. Existing work mainly focused on applying machine-learning techniques to …

Insider threat detection based on user historical behavior and attention mechanism

W He, X Wu, J Wu, X Xie, L Qiu… - 2021 IEEE Sixth …, 2021 - ieeexplore.ieee.org
Insider threat makes enterprises or organizations suffer from the loss of property and the
negative influence of reputation. User behavior analysis is the mainstream method of insider …

Attention-based LSTM for insider threat detection

F Yuan, Y Shang, Y Liu, Y Cao, J Tan - Applications and Techniques in …, 2019 - Springer
Insider threat is an important cyber security issue for businesses and organizations. Existing
insider threat detection methods can be roughly divided into two categories, statistical …

DeepMIT: a novel malicious insider threat detection framework based on recurrent neural network

D Sun, M Liu, M Li, Z Shi, P Liu… - 2021 IEEE 24th …, 2021 - ieeexplore.ieee.org
Currently, more and more malicious insiders are making threats, and the detection of insider
threats is becoming more challenging. The malicious insider often uses legitimate access …

Insider threat detection based on deep clustering of Multi-Source behavioral events

J Wang, Q Sun, C Zhou - Applied Sciences, 2023 - mdpi.com
With the continuous advancement of enterprise digitization, insider threats have become
one of the primary cybersecurity concerns for organizations. Therefore, it is of great …

Enhancing false negative and positive rates for efficient insider threat detection

M AlSlaiman, MI Salman, MM Saleh, B Wang - Computers & Security, 2023 - Elsevier
Insider threats on information security can become a burden for organizations. However,
outsider attacks have received more attention compared to insider attacks. Many …

Experimental evaluation of insider threat detection methods based on temporal representation

G Lu, H Zhang, T Liu, K Liao… - 2022 IEEE 10th …, 2022 - ieeexplore.ieee.org
At present, insider threat detection faces many challenges, such as imbalanced data sets,
the complexity of malicious behavior, high data dimension, and difficulty for manual analysis …

Bs-net: A behavior sequence network for insider threat detection

D Zhu, H Sun, N Li, B Mi, T Xi - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In view of the concealment and destructiveness of insider threats, to detect insider threats is
very important for protecting the security of enterprises and organizations. However, it is still …