2018
DOI: 10.1007/978-3-319-97864-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Data Stream Clustering for Real-Time Anomaly Detection: An Application to Insider Threats

Abstract: Insider threat detection is an emergent concern for academia, industries, and governments due to the growing number of insider incidents in recent years. The continuous streaming of unbounded data coming from various sources in an organisation, typically in a high velocity, leads to a typical Big Data computational problem. The malicious insider threat refers to anomalous behaviour(s) (outliers) that deviate from the normal baseline of a data stream. The absence of previously logged activities executed by user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…This section provides an up-to-date, comprehensive survey of recent approaches that address insider threat detection: (i) machine learning (ML) and deep learning (DL) approaches (either anomaly-based [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], and (ii) classification-based approaches [2,14,25,[28][29][30][31][32][33][34][35][36][37][38][39][40][41][42]).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This section provides an up-to-date, comprehensive survey of recent approaches that address insider threat detection: (i) machine learning (ML) and deep learning (DL) approaches (either anomaly-based [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], and (ii) classification-based approaches [2,14,25,[28][29][30][31][32][33][34][35][36][37][38][39][40][41][42]).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Researchers have employed many different algorithms for the insider threat detection problem, such as deep neural networks [43], multi-fuzzy classifiers [37], hidden Markov method [41,44], one-class support vector machines [40], deep belief networks [43], linear regression [26], clustering algorithms [24], and light gradient boosting machine [36]. We outline some of the more significant studies below.…”
Section: Machine Learningmentioning
confidence: 99%
“…The second one, clusters that considered as smaller than other clusters. In other words, in density-based methods, the small cluster that contains small data points and data points which are far from cluster centroid are considered as an outlier [12].…”
Section: Outlier Detection Phasementioning
confidence: 99%