Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2023
DOI: 10.1109/tdsc.2021.3135639
|View full text |Cite
|
Sign up to set email alerts
|

Hunting for Insider Threats Using LSTM-Based Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 32 publications
0
0
0
Order By: Relevance
“…Then, they regard behaviors with significant differences from the predicted results as abnormal behaviors. For example, Villarreal-Vasquez et al (2023) use LSTM to model system event sequences and predict the probability of the next event, with low-probability events being considered anomalous events. A similar approach is also used by Yuan et al (2019).…”
Section: Anomaly-based Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…Then, they regard behaviors with significant differences from the predicted results as abnormal behaviors. For example, Villarreal-Vasquez et al (2023) use LSTM to model system event sequences and predict the probability of the next event, with low-probability events being considered anomalous events. A similar approach is also used by Yuan et al (2019).…”
Section: Anomaly-based Detectionmentioning
confidence: 99%
“…Furthermore, we directly compare our scheme with 4 classical or novel anomaly-based insider threat detection schemes, which include the works of Tuor et al (2017), Meng et al (2020), Dr et al (2022), andVillarreal-Vasquez et al (2023). Table 4 shows the experimental results of our scheme and the other 4 schemes on the same CERT v6.2 dataset.…”
Section: Comparison Experiments With Anomaly-based Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Villarreal-Vasquez et al [29] present LADOHD (LSTMbased Anomaly Detector Over High-dimensional Data), a generic LSTM-based anomaly detection framework to protect against insider threats. The training data contain the behavior of different actors collected by monitoring 30 isolated machines operated in normal situation where no attack was reported during the collection period.…”
Section: Existing Work On Anomaly Detectionmentioning
confidence: 99%