Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2) and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance) in order to detect changes of behaviour, which are shown to have success in determining different insider threats.
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2mMpV0o
via IFTTT
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δημοφιλείς αναρτήσεις
-
Introduction Crisis management is a critical organizational function. Failure can result in serious harm to stakeholders, losses for an orga...
-
Publication date: 1 July 2017 Source: Cancer Letters, Volume 397 Author(s): Makoto Sano, Yoshimi Ichimaru, Masahiro Kurita, Emiko Hayashi,...
-
Maritime Logistics • General Ship Knowledge • Seaborne Cargoes and Dangerous Goods • Cargo Planning • Marine Terminal Operations • Modal and...
-
136 Unit 6 • Cause-Effect Essays What is a great topic for a cause-effect essay? This type of essay may focus more on the causes or more on ...
-
Winners of the 13th Annual 2017 Info Security PG's Global Excellence Awards® from #AlexandrosSfakianakis via Alexandros G.Sfakianakis ...
-
918 quotes have been tagged as self-confidence: Edgar Allan Poe: ‘I have great faith in fools - self-confidence my friends will call it.’, R...
-
Apply to 39 Fifth Third Bank Personal Banker jobs in United States on LinkedIn. Sign-up today, leverage your professional network, and get h...
-
Publication date: Available online 7 April 2017 Source: Experimental Cell Research Author(s): Guoxing Li, Huiyang Song, Weihua Yang, Shans...
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου