A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring

作者: Ivan Palomares , Harsha Kalutarage , Yan Huang , Paul Miller Robert McCausland , Gavin McWilliams

DOI: 10.1109/IFSA-SCIS.2017.8023360

关键词:

摘要: With the increase in volume, heterogeneity and uncertainty data, conventional analytics approaches for monitoring users behavior organisations are no longer sufficient effective reliable detection of malicious activities. This motivates need introducing additional analysis techniques. paper introduces an intelligent fusion method based on fuzzy aggregation functions typically utilized multi-criteria decision making. The proposed method, which can be integrated with systems, undertakes temporal processes pre-analyzed to enhance decision-making. An application a prominent area research cyber-security domain, insider threat problem, is shown validate usefulness our method.

参考文章(16)
Michel Grabisch, Fuzzy Measures and Integrals: Recent Developments Fifty Years of Fuzzy Logic and its Applications. pp. 125- 151 ,(2015) , 10.1007/978-3-319-19683-1_8
Salvatore Stolfo, Malek Ben Salem, Masquerade Attack Detection Using a Search-Behavior Modeling Approach Department of Computer Science, Columbia University. ,(2009) , 10.7916/D8X63TSV
Philip A Legg, Nick Moffat, Jason RC Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese, None, Towards a conceptual model and reasoning structure for insider threat detection Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. ,vol. 4, pp. 20- 37 ,(2013) , 10.22667/JOWUA.2013.12.31.020
Jason RC Nurse, Oliver Buckley, Philip A Legg, Michael Goldsmith, Sadie Creese, Gordon RT Wright, Monica Whitty, None, Understanding Insider Threat: A Framework for Characterising Attacks ieee symposium on security and privacy. pp. 214- 228 ,(2014) , 10.1109/SPW.2014.38
Matt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert, Insider Threat Identification by Process Analysis ieee symposium on security and privacy. pp. 251- 264 ,(2014) , 10.1109/SPW.2014.40
Joshua Glasser, Brian Lindauer, Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data ieee symposium on security and privacy. pp. 98- 104 ,(2013) , 10.1109/SPW.2013.37
Gianluca Campanella, Rita A. Ribeiro, A framework for dynamic multiple-criteria decision making decision support systems. ,vol. 52, pp. 52- 60 ,(2011) , 10.1016/J.DSS.2011.05.003
J. Albusac, D. Vallejo, J.J. Castro-Schez, C. Glez-Morcillo, L. Jiménez, Dynamic weighted aggregation for normality analysis in intelligent surveillance systems Expert Systems With Applications. ,vol. 41, pp. 2008- 2022 ,(2014) , 10.1016/J.ESWA.2013.08.097
Ronald R. Yager, Alexander Rybalov, Uninorm aggregation operators Fuzzy Sets and Systems. ,vol. 80, pp. 111- 120 ,(1996) , 10.1016/0165-0114(95)00133-6
János C. Fodor, Ronald R. Yager, Alexander Rybalov, Structure of uninorms International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. ,vol. 5, pp. 411- 427 ,(1997) , 10.1142/S0218488597000312