2017 International Conference on Green Informatics (ICGI) 2017
DOI: 10.1109/icgi.2017.37
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Detection Based on Deep Belief Network Feature Representation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…Several works use LSTM [14,16] for feature learning, followed by classification algorithms, like CNN. Another approach used deep learning for feature learning and then applied one class SVM [15] for classification. Our proposed approach gave an improved AUC = 97.38 when compared to the method using LSTM [16] gave an AUC = 94.49.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Several works use LSTM [14,16] for feature learning, followed by classification algorithms, like CNN. Another approach used deep learning for feature learning and then applied one class SVM [15] for classification. Our proposed approach gave an improved AUC = 97.38 when compared to the method using LSTM [16] gave an AUC = 94.49.…”
Section: Resultsmentioning
confidence: 99%
“…Random Forest with Randomization [13] Random Forest [13] 94.00 90.00 LSTM-RNN [14] 93.85 DBN-OCSVM [15] 87.79 Graph Convolutional Networks [42] 94.50 Proposed Method 96.34…”
Section: Methods Accuracy (%)mentioning
confidence: 99%
See 2 more Smart Citations
“…Hsieh et al, Isis Rose et al, and Nkosi et al [93][94][95] analyzed active directory services and audit logs using the Markov model, hierarchical task decomposition, and a rule learning algorithm, respectively. The works [96][97][98][99][100][101][102][103][104][105][106][107][108][109] combined and analyzed multiple log features collected from multiple sources, such as email, HTTP, logon, files, and devices to detect insider threats using statistical methods and machine-learning techniques.…”
Section: Cyber Activity Behaviormentioning
confidence: 99%