Suresh et al., 2021 - Google Patents
Insider attack: Internal cyber attack detection using machine learningSuresh et al., 2021
- Document ID
- 1084930972173938376
- Author
- Suresh P
- Madhavu M
- Publication year
- Publication venue
- 2021 12th International conference on computing communication and networking technologies (ICCCNT)
External Links
Snippet
A Cyber Attack is a sudden attempt launched by cybercriminals against multiple computers or networks. According to evolution of cyber space, insider attack is the most serious attack faced by end users, all over the world. Cyber Security reports shows that both US federal …
- 238000001514 detection method 0 title abstract description 46
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharma et al. | User behavior analytics for anomaly detection using LSTM autoencoder-insider threat detection | |
US9336388B2 (en) | Method and system for thwarting insider attacks through informational network analysis | |
Chou et al. | Network intrusion detection design using feature selection of soft computing paradigms | |
Hosseini et al. | Anomaly process detection using negative selection algorithm and classification techniques | |
Kim et al. | Empirical evaluation of SVM-based masquerade detection using UNIX commands | |
Suresh et al. | Insider attack: Internal cyber attack detection using machine learning | |
Levshun et al. | A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities | |
Liu et al. | Unsupervised insider detection through neural feature learning and model optimisation | |
Ma et al. | DANTE: Predicting Insider Threat using LSTM on system logs | |
Patil et al. | Malicious web pages detection using feature selection techniques and machine learning | |
Arock | Efficient detection of SQL injection attack (SQLIA) Using pattern-based neural network model | |
Jayaprakash et al. | Database intrusion detection system using octraplet and machine learning | |
Kotenko et al. | Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks | |
Singh et al. | User behaviour based insider threat detection in critical infrastructures | |
Tran et al. | Data curation and quality evaluation for machine learning-based cyber intrusion detection | |
Gong et al. | Enhancing Cybersecurity Resilience in Finance with Deep Learning for Advanced Threat Detection | |
Babu et al. | Network intrusion detection using machine learning algorithms | |
Kusumaputri et al. | Anomaly Detection based on NSL-KDD using XGBoost with Optuna Tuning | |
Majd et al. | Ransomware classification using machine learning | |
Singh et al. | Detecting intrusive transactions in databases using partially-ordered sequential rule mining and fractional-distance based anomaly detection | |
Zhu et al. | Business process mining based insider threat detection system | |
Madhuri et al. | Anomaly detection techniques | |
Priyansh et al. | Durbin: A comprehensive approach to analysis and detection of emerging threats due to network intrusion | |
Hu et al. | Design and analysis of techniques for detection of malicious activities in database systems | |
Nasir et al. | Cloud computing security via intelligent intrusion detection mechanisms |