2018
DOI: 10.1155/2018/5906368
|View full text |Cite
|
Sign up to set email alerts
|

Distance Measurement Methods for Improved Insider Threat Detection

Abstract: Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2) and analyses a number of distance vector methods (Damerau-Levenshtein Distance, Cosine Distance, and Jaccard… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(30 citation statements)
references
References 12 publications
0
28
0
Order By: Relevance
“…Further, this result indicates lower overall AUC and higher accuracy than the latest studies. (Lo et al [36]: Accuracy 69%, Yuan et al [37]: AUC 0.9449)…”
Section: Fig 6 Results Of Optimized Insider Threat Detection Model Umentioning
confidence: 98%
“…Further, this result indicates lower overall AUC and higher accuracy than the latest studies. (Lo et al [36]: Accuracy 69%, Yuan et al [37]: AUC 0.9449)…”
Section: Fig 6 Results Of Optimized Insider Threat Detection Model Umentioning
confidence: 98%
“…Components of CPSD analysis (i.e., percentage of amplitude with the major peak, phase lag, and corresponding time-lag) are shown in Table 1. Major peaks in the amplitude spectra were identified by using a threshold quantified using a smoothed z-score algorithm [52][53][54]. The algorithm is based on the principle of dispersion and is robust as it builds a separate moving mean and deviation so that the signals themselves do not pollute the threshold [53].…”
Section: Resultsmentioning
confidence: 99%
“…Major peaks in the amplitude spectra were identified by using a threshold quantified using a smoothed z-score algorithm [52][53][54]. The algorithm is based on the principle of dispersion and is robust as it builds a separate moving mean and deviation so that the signals themselves do not pollute the threshold [53]. Peak or high amplitude indicates a strong correlation between response and forcing signal at that frequency.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [33] implements a fuzzy classifier along with genetic algorithm (GA) to enhance the efficiency of a fuzzy classifier and the functionality of all other modules, to achieve better results in terms of false alarms. Reference [34] applies Hidden Markov method on a CERT dataset and analyses a number of distance vector methods in order to detect changes of behavior, which are shown to have success in determining different insider threats.…”
Section: Background and Related Workmentioning
confidence: 99%