Authors :
Harshata Bhargava, Radhe Shyam Panda.
Volume/Issue :
Volume 3 - 2018, Issue 11 - November
Google Scholar :
https://goo.gl/DF9R4u
Scribd :
https://goo.gl/NZ3D1C
Thomson Reuters ResearcherID :
https://goo.gl/KTXLC3
Abstract :
Insider attack identification in any big organization is a basic issue that as of now has no encouraging solution. It speaks to a noteworthy test since have accessibility and execution necessities can’t be disregarded. An approach based on network, enables these necessities to be met yet is constrained by the granularity of information accessible and the close inconceivability of characterizing accurate marks for known attack composes. This paper reviews major insider attacks methods and its working on various scenarios and dataset.
Keywords :
Insider Attack, Network Attack, Data Mining Techniques, SVM, User Behaviour.
Insider attack identification in any big organization is a basic issue that as of now has no encouraging solution. It speaks to a noteworthy test since have accessibility and execution necessities can’t be disregarded. An approach based on network, enables these necessities to be met yet is constrained by the granularity of information accessible and the close inconceivability of characterizing accurate marks for known attack composes. This paper reviews major insider attacks methods and its working on various scenarios and dataset.
Keywords :
Insider Attack, Network Attack, Data Mining Techniques, SVM, User Behaviour.