A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today's digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …

On vulnerability and security log analysis: A systematic literature review on recent trends

J Svacina, J Raffety, C Woodahl, B Stone… - Proceedings of the …, 2020 - dl.acm.org
Log analysis is a technique of deriving knowledge from log files containing records of events
in a computer system. A common application of log analysis is to derive critical information …

Mining causality of network events in log data

S Kobayashi, K Otomo, K Fukuda… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Network log messages (eg, syslog) are expected to be valuable and useful information to
detect unexpected or anomalous behavior in large scale networks. However, because of the …

Landscape of automated log analysis: A systematic literature review and mapping study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things

YM Tukur, D Thakker, IU Awan - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) platforms are responsible for overall data processing in the
IoT System. This ranges from analytics and big data processing to gathering all sensor data …

Insider intrusion detection techniques: A state-of-the-art review

N TN, D Pramod - Journal of Computer Information Systems, 2024 - Taylor & Francis
This study is a systematic literature review on anomaly-based intrusion detection methods
specially to detect insider attacks. The focus is to enumerate the techniques for modeling …

[HTML][HTML] Revolutionizing SIEM security: An innovative correlation engine design for multi-layered attack detection

M Sheeraz, MH Durad, MA Paracha, SM Mohsin… - Sensors, 2024 - mdpi.com
Advances in connectivity, communication, computation, and algorithms are driving a
revolution that will bring economic and social benefits through smart technologies of the …

Anomalous user activity detection in enterprise multi-source logs

Q Hu, B Tang, D Lin - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Security is one of the top concerns of any enterprise. Most security practitioners in
enterprises rely on correlation rules to detect potential threats. While the rules are intuitive to …

Cyber threats detection and mitigation using machine learning

V Ambalavanan - Handbook of research on machine and deep …, 2020 - igi-global.com
Cyberspace plays a dominant role in the world of electronic communication. It is a virtual
space where the interconnecting network has an independent technology infrastructure. The …