Role-based Log Analysis Applying Deep Learning for Insider Threat Detection

Author(s):  
Dongxue Zhang ◽  
Yang Zheng ◽  
Yu Wen ◽  
Yujue Xu ◽  
Jingchuo Wang ◽  
...  
Author(s):  
Zhihong Tian ◽  
Wei Shi ◽  
Zhiyuan Tan ◽  
Jing Qiu ◽  
Yanbin Sun ◽  
...  

2017 ◽  
Vol 11 (2) ◽  
pp. 503-512 ◽  
Author(s):  
Philip A. Legg ◽  
Oliver Buckley ◽  
Michael Goldsmith ◽  
Sadie Creese

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Rida Nasir ◽  
Mehreen Afzal ◽  
Rabia Latif ◽  
Waseem Iqabl

2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Teng Hu ◽  
Weina Niu ◽  
Xiaosong Zhang ◽  
Xiaolei Liu ◽  
Jiazhong Lu ◽  
...  

In the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Anyone using the intranet computer may access content that he does not have permission to access. For an insider attacker, it is relatively easy to steal a colleague’s password or use an unattended computer to launch an attack. A common one-time user authentication method may not work in this situation. In this paper, we propose a user authentication method based on mouse biobehavioral characteristics and deep learning, which can accurately and efficiently perform continuous identity authentication on current computer users, thus to address insider threats. We used an open-source dataset with ten users to carry out experiments, and the experimental results demonstrated the effectiveness of the approach. This approach can complete a user authentication task approximately every 7 seconds, with a false acceptance rate of 2.94% and a false rejection rate of 2.28%.


Sign in / Sign up

Export Citation Format

Share Document