Statistical network behavior based threat detection

Author(s):  
Jin Cao ◽  
Lawrence Drabeck ◽  
Ran He
2015 ◽  
Vol 6 (1) ◽  
pp. 1-30 ◽  
Author(s):  
Shing-Han Li ◽  
Yu-Cheng Kao ◽  
Zong-Cyuan Zhang ◽  
Ying-Ping Chuang ◽  
David C. Yen

2017 ◽  
Vol 41 (5) ◽  
pp. 411-421 ◽  
Author(s):  
Dawn M. Sweet ◽  
Christian A. Meissner ◽  
Dominick J. Atkinson

2014 ◽  
Vol 568-570 ◽  
pp. 1370-1375
Author(s):  
Heng Qin ◽  
Jin Hui Zhao

Insiders, who have the lawful authority in network information system, formed a huge threat to security by abuse and misuse of authority. It has become one of huge challenge to the security of information system. Against the features of more subtle and more difficult to find, this paper study how to perceive the trusted behavior of insiders with behavior-based attestation. Taking into account the impact of various uncertainties in monitoring and perception process, dynamic awareness model of insider threat is presented based on subjective logic. In order to find the insider threats, monitoring data of actual behaviors are compared with operation tree; legality of the user behavior dynamically analyzed according to historical experience and current experience; the trust of user behavior legitimacy is represented as trust point in subjective logic. Finally, experiments are employed to test the validity and applicability of proposed method.


2014 ◽  
Vol 11 (6) ◽  
pp. 551-566
Author(s):  
MeongJae Seong ◽  
Haeryong Park ◽  
Bomin Choi ◽  
Eul Gyu Im

Sign in / Sign up

Export Citation Format

Share Document