Detecting and Preventing Cyber Insider Threats: A Survey

作者: Liu Liu , Olivier De Vel , Qing-Long Han , Jun Zhang , Yang Xiang

DOI: 10.1109/COMST.2018.2800740

关键词:

摘要: Information communications technology systems are facing an increasing number of cyber security threats, the majority of which are originated by insiders. As insiders reside behind …

参考文章(86)
Haym Hirsh, Brian D. Davison, Predicting Sequences of User Actions ,(1998)
Terran Lane, Carla E Brodley, An Application of Machine Learning to Anomaly Detection ,(1999)
David Dagon, Chris Nunnery, Vikram Sharma, Brent ByungHoon Kang, Julian B. Grizzard, Peer-to-peer botnets: overview and case study conference on workshop on hot topics in understanding botnets. pp. 1- 1 ,(2007)
Miao Xie, Jiankun Hu, Xinghuo Yu, Elizabeth Chang, Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD network and system security. pp. 542- 549 ,(2014) , 10.1007/978-3-319-11698-3_44
Christopher Hadnagy, Social engineering : the art of human hacking Wiley. ,(2011)
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)
E.M. Shehab, M.W. Sharp, L. Supramaniam, T.A. Spedding, Enterprise resource planning: An integrative review Business Process Management Journal. ,vol. 10, pp. 359- 386 ,(2004) , 10.1108/14637150410548056
Yihua Liao, V. Rao Vemuri, Using Text Categorization Techniques for Intrusion Detection usenix security symposium. pp. 51- 59 ,(2002)
Anthony Cozzie, Chris Grier, Yuanyuan Zhou, Joseph Tucek, Samuel T. King, Weihang Jiang, Designing and implementing malicious hardware LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 5- ,(2008)