Study on user’s identification system in insider threats
Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the...
Saved in:
Main Authors: | PEI Qing-qi1, ZHAO Peng2, ZHANG Hong-bin3, WANG Chao2, YIN Hao1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74650541/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Insider threat detection based on operational attention and data augmentation
by: Guanyun FENG, et al.
Published: (2023-06-01) -
Study on user behavior profiling in insider threat detection
by: Yuanbo GUO, et al.
Published: (2018-12-01) -
Business process mining based insider threat detection system
by: Tai-ming ZHU, et al.
Published: (2016-10-01) -
Application of machine learning in the fake user identification of IoT
by: Rongfang ZHANG, et al.
Published: (2019-07-01) -
Multi-Granularity User Anomalous Behavior Detection
by: Wenying Feng, et al.
Published: (2024-12-01)