Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning. Le, D. C. & Zincir-Heywood, A. N. In IEEE Security and Privacy Workshops (SPW '18), pages 270-275, San Francisco, CA, USA, 2018.
Paper
Paper doi abstract bibtex 2 downloads Insider threat is a prominent cyber-security dan- ger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and unsupervised learning algorithms. To this end, we study data exploration and analysis, anomaly detection and malicious behaviour classification on a publicly available data set. We evaluate several supervised and unsupervised learning algorithms - HMM, SOM, and DT - using this workflow.
@inproceedings{Le_spw2018,
abstract = {Insider threat is a prominent cyber-security dan- ger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and unsupervised learning algorithms. To this end, we study data exploration and analysis, anomaly detection and malicious behaviour classification on a publicly available data set. We evaluate several supervised and unsupervised learning algorithms - HMM, SOM, and DT - using this workflow.},
author = {Le, Duc C. and Zincir-Heywood, A. Nur},
title = {Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning},
booktitle = {IEEE Security and Privacy Workshops (SPW '18)},
year = {2018},
address = {San Francisco, CA, USA},
pages = {270-275},
doi = {10.1109/SPW.2018.00043},
keywords = {Insider Threat Detection, Unsupervised Machine Learning, Supervised Machine Learning, Anomaly detection, Behaviour Classification},
url = {https://ieeexplore.ieee.org/abstract/document/8424659/},
url_Paper = {lcd_spw2018.pdf}
}
Downloads: 2
{"_id":"S2QPNJgrXvX7fa2bS","bibbaseid":"le-zincirheywood-evaluatinginsiderthreatdetectionworkflowusingsupervisedandunsupervisedlearning-2018","downloads":2,"creationDate":"2019-02-15T18:09:28.734Z","title":"Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning","author_short":["Le, D. C.","Zincir-Heywood, A. N."],"year":2018,"bibtype":"inproceedings","biburl":"https://web.cs.dal.ca/~lcd/pubs/lcd.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","abstract":"Insider threat is a prominent cyber-security dan- ger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and unsupervised learning algorithms. To this end, we study data exploration and analysis, anomaly detection and malicious behaviour classification on a publicly available data set. We evaluate several supervised and unsupervised learning algorithms - HMM, SOM, and DT - using this workflow.","author":[{"propositions":[],"lastnames":["Le"],"firstnames":["Duc","C."],"suffixes":[]},{"propositions":[],"lastnames":["Zincir-Heywood"],"firstnames":["A.","Nur"],"suffixes":[]}],"title":"Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning","booktitle":"IEEE Security and Privacy Workshops (SPW '18)","year":"2018","address":"San Francisco, CA, USA","pages":"270-275","doi":"10.1109/SPW.2018.00043","keywords":"Insider Threat Detection, Unsupervised Machine Learning, Supervised Machine Learning, Anomaly detection, Behaviour Classification","url":"https://ieeexplore.ieee.org/abstract/document/8424659/","url_paper":"lcd_spw2018.pdf","bibtex":"@inproceedings{Le_spw2018,\n abstract = {Insider threat is a prominent cyber-security dan- ger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using supervised and unsupervised learning algorithms. To this end, we study data exploration and analysis, anomaly detection and malicious behaviour classification on a publicly available data set. We evaluate several supervised and unsupervised learning algorithms - HMM, SOM, and DT - using this workflow.},\n author = {Le, Duc C. and Zincir-Heywood, A. Nur},\n title = {Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning},\n booktitle = {IEEE Security and Privacy Workshops (SPW '18)},\n year = {2018},\n address = {San Francisco, CA, USA},\n pages = {270-275},\n doi = {10.1109/SPW.2018.00043},\n keywords = {Insider Threat Detection, Unsupervised Machine Learning, Supervised Machine Learning, Anomaly detection, Behaviour Classification},\n url = {https://ieeexplore.ieee.org/abstract/document/8424659/},\n url_Paper = {lcd_spw2018.pdf}\n}\n\n","author_short":["Le, D. C.","Zincir-Heywood, A. N."],"key":"Le_spw2018","id":"Le_spw2018","bibbaseid":"le-zincirheywood-evaluatinginsiderthreatdetectionworkflowusingsupervisedandunsupervisedlearning-2018","role":"author","urls":{"Paper":"https://ieeexplore.ieee.org/abstract/document/8424659/"," paper":"https://web.cs.dal.ca/~lcd/pubs/lcd_spw2018.pdf"},"keyword":["Insider Threat Detection","Unsupervised Machine Learning","Supervised Machine Learning","Anomaly detection","Behaviour Classification"],"metadata":{"authorlinks":{"le, d":"https://web.cs.dal.ca/~lcd/"}},"downloads":2,"html":""},"search_terms":["evaluating","insider","threat","detection","workflow","using","supervised","unsupervised","learning","le","zincir-heywood"],"keywords":["insider threat detection","unsupervised machine learning","supervised machine learning","anomaly detection","behaviour classification"],"authorIDs":["54xs5YjqNu6xHk29R","5a74da6e50da097644000035","5df8f6b0277e45de01000181","5e23bb7579cb6df20100009d","5e246cfc36283cde01000029","5e2f905648b7a4df01000142","5e3444e10c807ede010000dc","5e3449e20c807ede01000130","5e4360bea37866de01000186","5e4571a449667cde0100017a","5e4d7a9b08a8e5de010001ad","5e6b902f1e8366df0100011a","C98bz68HJ5foxXwYN","HhQMFT7BobpBEHFBD","KgiaN4EuDodDG2bKf","MD2Y99seHKkvJKtMs","NeWeKRD9bbGJ5GC8z","S7Syib2qnK3HDykBn","SMxkccDMtPzyyKcAN","TLgtB22T7Wn7PTGZG","XfnhHssx7qRnaqgGk","Yp7dsRY4LcAsX3N49","cKzt7ZFsitbk3Yqzc","doRBd2QBfq3P4NfvH","gSrTP54evNqY2jCm2","h5A5gmdteNyyHydSH","kMcN5PbYTq3sczEFr","smijjbJmCAJ9HX2aK","ttpzePbKSjjv8JMPj","u6uEpPKZwnPNxTFxA"],"dataSources":["4QJPx5n9LceLztYQz","qov2MJF4DhMZbnA26"]}