Nothing Special   »   [go: up one dir, main page]

Suresh et al., 2021 - Google Patents

Insider attack: Internal cyber attack detection using machine learning

Suresh et al., 2021

Document ID
1084930972173938376
Author
Suresh P
Madhavu M
Publication year
Publication venue
2021 12th International conference on computing communication and networking technologies (ICCCNT)

External Links

Snippet

A Cyber Attack is a sudden attempt launched by cybercriminals against multiple computers or networks. According to evolution of cyber space, insider attack is the most serious attack faced by end users, all over the world. Cyber Security reports shows that both US federal …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Sharma et al. User behavior analytics for anomaly detection using LSTM autoencoder-insider threat detection
US9336388B2 (en) Method and system for thwarting insider attacks through informational network analysis
Chou et al. Network intrusion detection design using feature selection of soft computing paradigms
Hosseini et al. Anomaly process detection using negative selection algorithm and classification techniques
Kim et al. Empirical evaluation of SVM-based masquerade detection using UNIX commands
Suresh et al. Insider attack: Internal cyber attack detection using machine learning
Levshun et al. A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Liu et al. Unsupervised insider detection through neural feature learning and model optimisation
Ma et al. DANTE: Predicting Insider Threat using LSTM on system logs
Patil et al. Malicious web pages detection using feature selection techniques and machine learning
Arock Efficient detection of SQL injection attack (SQLIA) Using pattern-based neural network model
Jayaprakash et al. Database intrusion detection system using octraplet and machine learning
Kotenko et al. Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks
Singh et al. User behaviour based insider threat detection in critical infrastructures
Tran et al. Data curation and quality evaluation for machine learning-based cyber intrusion detection
Gong et al. Enhancing Cybersecurity Resilience in Finance with Deep Learning for Advanced Threat Detection
Babu et al. Network intrusion detection using machine learning algorithms
Kusumaputri et al. Anomaly Detection based on NSL-KDD using XGBoost with Optuna Tuning
Majd et al. Ransomware classification using machine learning
Singh et al. Detecting intrusive transactions in databases using partially-ordered sequential rule mining and fractional-distance based anomaly detection
Zhu et al. Business process mining based insider threat detection system
Madhuri et al. Anomaly detection techniques
Priyansh et al. Durbin: A comprehensive approach to analysis and detection of emerging threats due to network intrusion
Hu et al. Design and analysis of techniques for detection of malicious activities in database systems
Nasir et al. Cloud computing security via intelligent intrusion detection mechanisms