EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE

作者: PALLABI PARVEEN , NATHAN MCDANIEL , ZACKARY WEGER , JONATHAN EVANS , BHAVANI THURAISINGHAM

DOI: 10.1142/S0218213013600130

关键词:

摘要: Evidence of malicious insider activity is often buried within large data streams, such as system logs accumulated over months or years. Ensemble-based stream mining leverages multiple classificatio...

参考文章(44)
Lawrence B. Holder, William Eberle, Mining for Structural Anomalies in Graph-based Data. DMIN. pp. 376- 389 ,(2007)
Malek Ben Salem, Shlomo Hershkop, Salvatore J Stolfo, A Survey of Insider Attack Detection Research Insider Attack and Cyber Security. pp. 69- 90 ,(2008) , 10.1007/978-0-387-77322-3_5
Haym Hirsh, Brian D. Davison, Predicting Sequences of User Actions ,(1998)
Richard Brackney, Robert H. Anderson, Understanding the Insider Threat ,(2004)
John Arthur Swets, Ronald M. Pickett, Evaluation of diagnostic systems : methods from signal detection theory Academic Press. ,(1982)
Yihua Liao, V. Rao Vemuri, Using Text Categorization Techniques for Intrusion Detection usenix security symposium. pp. 51- 59 ,(2002)
Eleazar Eskin, Salvatore Stolfo, Zhi-Da Zhong, Matthew Miller, Wei-Ang Lee, George Yi, Adaptive Model Generation for Intrusion Detection Systems ,(2000) , 10.7916/D8GX4J9V
Diane J Cook, Lawrence B Holder, None, Mining Graph Data : Wiley-Interscience,. ,(2006)
E Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Sal Stolfo, A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA APPLICATIONS OF DATA MINING IN COMPUTER SECURITY. pp. 0- 0 ,(2002) , 10.7916/D8D50TQT