2006 IEEE International Performance Computing and Communications Conference
DOI: 10.1109/.2006.1629440
|View full text |Cite
|
Sign up to set email alerts
|

Role-Based Profile Analysis for Scalable and Accurate Insider-Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 16 publications
0
17
0
Order By: Relevance
“…This approach, however, leads to false positives. Park and Giordano [25] reverse the Hu et al approach, analyzing a user's behavior and checking that it is as expected. Several researchers [26]- [28] incorporate risk assessment into an extended access control framework, adapting user privileges based on role, attributes, and level of trust, which drops when a user's behavior becomes suspicions.…”
Section: Related Workmentioning
confidence: 99%
“…This approach, however, leads to false positives. Park and Giordano [25] reverse the Hu et al approach, analyzing a user's behavior and checking that it is as expected. Several researchers [26]- [28] incorporate risk assessment into an extended access control framework, adapting user privileges based on role, attributes, and level of trust, which drops when a user's behavior becomes suspicions.…”
Section: Related Workmentioning
confidence: 99%
“…Although there is some existing work in this area (e.g., [77,94]), more research is needed to find practical solutions.…”
Section: Future Workmentioning
confidence: 99%
“…Park etc. [9] developed the monitoring mechanisms with the role-based profile and individual-based profiles. Moreover, they used frequencies of corresponding events as metrics.…”
Section: Related Workmentioning
confidence: 99%