Business process mining based insider threat detection system
Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the...
Saved in:
Main Authors: | Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016265/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study on user behavior profiling in insider threat detection
by: Yuanbo GUO, et al.
Published: (2018-12-01) -
Insider threat detection based on operational attention and data augmentation
by: Guanyun FENG, et al.
Published: (2023-06-01) -
Multi-Granularity User Anomalous Behavior Detection
by: Wenying Feng, et al.
Published: (2024-12-01) -
Study on user’s identification system in insider threats
by: PEI Qing-qi1, et al.
Published: (2009-01-01) -
Behavior-oriented inside network security situation modeling and analysis
by: Cheng ZHU, et al.
Published: (2016-08-01)