Insider Attack Detection Implementation Using Behavior Analysis


Authors : Harshata Bhargava, Radhe Shyam Panda.

Volume/Issue : Volume 3 - 2018, Issue 12 - December

Google Scholar : https://goo.gl/DF9R4u

Scribd : https://goo.gl/WdMkcY

Thomson Reuters ResearcherID : https://goo.gl/KTXLC3

Insider attack detection in an enterprise network environment is a critical problem that currently has no promising solution. This paper introduces new idea of use of sequence mining algorithms for distinguishing insider attack in network. According to current work we have discovered that mixes of pattern development with Behavior factors are most appropriate for recognizable proof of insider attack in any network. This paper presents experiments in which execution essentially helped in building an ideally estimated data structure representations of the sequence database that requires the need of Behavior parameters joining in insider attack identification calculations.

Keywords : Insider Attack, Network Attack, Data Mining Techniques, User Behaviour.

CALL FOR PAPERS


Paper Submission Last Date
30 - April - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe