A Review on Insider Attack Detection Algorithm Using Data Mining Techniques


Authors : Harshata Bhargava, Radhe Shyam Panda.

Volume/Issue : Volume 3 - 2018, Issue 11 - Novermber

Google Scholar : https://goo.gl/DF9R4u

Scribd : https://goo.gl/NZ3D1C

Thomson Reuters ResearcherID : https://goo.gl/KTXLC3

Insider attack identification in any big organization is a basic issue that as of now has no encouraging solution. It speaks to a noteworthy test since have accessibility and execution necessities can’t be disregarded. An approach based on network, enables these necessities to be met yet is constrained by the granularity of information accessible and the close inconceivability of characterizing accurate marks for known attack composes. This paper reviews major insider attacks methods and its working on various scenarios and dataset.

Keywords : Insider Attack, Network Attack, Data Mining Techniques, SVM, User Behaviour.

CALL FOR PAPERS


Paper Submission Last Date
31 - August - 2019

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe