Study on user’s identification system in insider threats

Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the...

Full description

Saved in:
Bibliographic Details
Main Authors: PEI Qing-qi1, ZHAO Peng2, ZHANG Hong-bin3, WANG Chao2, YIN Hao1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74650541/
Tags: Add Tag
No Tags, Be the first to tag this record!