Study on user behavior profiling in insider threat detection
Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks...
Saved in:
| Main Authors: | Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2018-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018282/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Insider threat detection for specific threat scenarios
by: Tian Tian, et al.
Published: (2025-03-01) -
Business process mining based insider threat detection system
by: Tai-ming ZHU, et al.
Published: (2016-10-01) -
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
by: Findlay Whitelaw, et al.
Published: (2024-01-01) -
Research on insider threat detection based on personalized federated learning and behavior log analysis
by: Xiaoyun Ye, et al.
Published: (2025-06-01) -
Daily insider threat detection with hybrid TCN transformer architecture
by: Xiaoyun Ye, et al.
Published: (2025-08-01)