2009 Fifth International Conference on Information Assurance and Security 2009
DOI: 10.1109/ias.2009.262
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Insider Attacks Using Non-negative Matrix Factorization

Abstract: Abstract-It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative Matrix Factoriz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
(14 reference statements)
0
3
0
Order By: Relevance
“…To address the challenge of large amounts of audit data that are generated which in turn make analysis tedious and difficult, some researchers have proposed the use of non-negative matrix factorization (Platos et al, 2009) to minimize the actual amount of data that needs to be processed to discover malicious insider activities. It is not clear, however, how the large amounts of logged data are partitioned into clusters that may have hidden patterns and those that do not.…”
Section: Data-centric Approachesmentioning
confidence: 99%
“…To address the challenge of large amounts of audit data that are generated which in turn make analysis tedious and difficult, some researchers have proposed the use of non-negative matrix factorization (Platos et al, 2009) to minimize the actual amount of data that needs to be processed to discover malicious insider activities. It is not clear, however, how the large amounts of logged data are partitioned into clusters that may have hidden patterns and those that do not.…”
Section: Data-centric Approachesmentioning
confidence: 99%
“…To achieve decision making ability, another method must be used. In our previous works [16], [9], [20], we used the same and very simple technique. When the decomposition is processed, we take vectors of weights from matrix H and split them in two groups -clusters according their label, i.e.…”
Section: Non-negative Matrix Factorization (Nmf)mentioning
confidence: 99%
“…Intrusion detection systems (IDS) were proposed to prevent security violations in computer systems and networks [2], [11]. They are intended to reinforce basic security measures such as authentication and access control and detect actions that aim to break security policies in protected computer system.…”
Section: Introductionmentioning
confidence: 99%