Anomaly Threat Detection System using User and Role-Based Profile Assessment
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 3)Publication Date: 2018-08-02
Authors : U. Indumathy M. Nivedha K. Alice;
Page : 484-488
Keywords : Intrusion; Cyber security; Insider threat;
Abstract
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the user's behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy
Other Latest Articles
- A Game Based Graphical Password Authentication System to Prevent Shoulder-Surfing
- Rumour Source Identification in Network
- Simulation of active scheme Three Phase to Seven Phase Transformation using Special condition Transformer Connection
- Characterization of Al/WC/Fly ash Metal Matrix Composites
- Development and application of Liquid Chromatographic method for determination of Caspofungin Acetate in sterile, lyophilized powder for Injection
Last modified: 2018-08-02 20:23:01