Rap-net: A resource access pattern network for insider threat detection

D Zhu, X Huang, N Li, H Sun, M Liu… - 2022 International Joint …, 2022 - ieeexplore.ieee.org
The subtle and dynamic nature of insider threat makes it one of the most challenging
problems in cyber security domain. Most of the existing studies model the problem from the …

Bs-net: A behavior sequence network for insider threat detection

D Zhu, H Sun, N Li, B Mi, T Xi - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
In view of the concealment and destructiveness of insider threats, to detect insider threats is
very important for protecting the security of enterprises and organizations. However, it is still …

Insider threat detection with deep neural network

F Yuan, Y Cao, Y Shang, Y Liu, J Tan… - … Science–ICCS 2018: 18th …, 2018 - Springer
Insider threat detection has attracted a considerable attention from the researchers and
industries. Existing work mainly focused on applying machine-learning techniques to …

Anomaly detection for scenario-based insider activities using cgan augmented data

RG Gayathri, A Sajjanhar, Y Xiang… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Insider threats are the cyber attacks from the trusted entities within an organization. An
insider attack is hard to detect as it may not leave a footprint and potentially cause huge …

Gru and multi-autoencoder based insider threat detection for cyber security

F Meng, P Lu, J Li, T Hu, M Yin… - 2021 IEEE Sixth …, 2021 - ieeexplore.ieee.org
The concealment and confusion nature of insider threat makes it a challenging task for
security analysts to identify insider threat from log data. To detect insider threat, we propose …

LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection

X Cai, Y Wang, S Xu, H Li, Y Zhang, X Yuan - arXiv preprint arXiv …, 2024 - arxiv.org
Enterprises and organizations are faced with potential threats from insider employees that
may lead to serious consequences. Previous studies on insider threat detection (ITD) mainly …

Attention-based LSTM for insider threat detection

F Yuan, Y Shang, Y Liu, Y Cao, J Tan - Applications and Techniques in …, 2019 - Springer
Insider threat is an important cyber security issue for businesses and organizations. Existing
insider threat detection methods can be roughly divided into two categories, statistical …

BRITD: behavior rhythm insider threat detection with time awareness and user adaptation

S Song, N Gao, Y Zhang, C Ma - Cybersecurity, 2024 - Springer
Researchers usually detect insider threats by analyzing user behavior. The time information
of user behavior is an important concern in internal threat detection. Existing works on …

Enhancing false negative and positive rates for efficient insider threat detection

M AlSlaiman, MI Salman, MM Saleh, B Wang - Computers & Security, 2023 - Elsevier
Insider threats on information security can become a burden for organizations. However,
outsider attacks have received more attention compared to insider attacks. Many …

Data augmentation for insider threat detection with GAN

F Yuan, Y Shang, Y Liu, Y Cao… - 2020 IEEE 32nd …, 2020 - ieeexplore.ieee.org
In insider threat detection domain, the datasets are highly imbalanced, where the number of
user's normal behavior is higher than that of insider's anomalous behavior. A direct …