2023
DOI: 10.1007/s11227-023-05049-x
|View full text |Cite
|
Sign up to set email alerts
|

An ensemble-based framework for user behaviour anomaly detection and classification for cybersecurity

Abstract: Nowadays, the speed of the user and application logs is so quick that it is almost impossible to analyse them in real time without using high-performance systems and platforms. In cybersecurity, human behaviour is responsible directly or indirectly for the most common attacks (i.e. ransomware and phishing). To monitor user behaviour, it is necessary to process fast user logs coming from different and heterogeneous sources, having part of the data or some entire sources missing. A framework based on the elastic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…To compensate for missing values, statistical methods utilize statistical values; for instance, the mean filling approach [10] and fuzzy-rough nearest neighbours [11] are two examples. Nevertheless, statistical approaches are inadequate for imputation of missing data in case of IoT, as these methods may not utilize temporal insight.…”
Section: Related Workmentioning
confidence: 99%
“…To compensate for missing values, statistical methods utilize statistical values; for instance, the mean filling approach [10] and fuzzy-rough nearest neighbours [11] are two examples. Nevertheless, statistical approaches are inadequate for imputation of missing data in case of IoT, as these methods may not utilize temporal insight.…”
Section: Related Workmentioning
confidence: 99%
“…To this end, the elastic stack (ELK) architecture established by Folino et al [20] is proposed to process and store log data in real time from various users and applications. Using the benefits of system produces an ensemble of models to categorize user behavior and identify abnormalities in real time.…”
Section: Related Workmentioning
confidence: 99%
“…This framework is very close to the method proposed in this paper for developing a framework using Elasticsearch ML APIs. Folino et al [13] have developed a framework using ELK stack to monitor user behaviour for and detect anomalies in real time using the Kubernetes platform. Hariharan et al [14] came up with CAMLPAD where they have used anomaly detection technique using scoring method like Elasticsearch X-Pack.…”
Section: Introductionmentioning
confidence: 99%