2020 3rd International Conference on Intelligent Sustainable Systems (ICISS) 2020
DOI: 10.1109/iciss49785.2020.9315932
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Detection using Deep Learning: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Others do not focus on threat hunting [24]. Some of existing surveys fail to develop a future road map [25] [26]. Most of them do not discuss the role of AI [27].…”
Section: Existing Surveysmentioning
confidence: 99%
See 3 more Smart Citations
“…Others do not focus on threat hunting [24]. Some of existing surveys fail to develop a future road map [25] [26]. Most of them do not discuss the role of AI [27].…”
Section: Existing Surveysmentioning
confidence: 99%
“…Multiple studies have initiated the partitioning of resources for threat hunting and mitigating is a somewhat new sector for businesses to consider [26]. The authors of [25] developed a deep learning model systems that will allow for constant moderation and quick detection of potential threats in their systems. Deep learning tools will assist in managing the rapid technological development and the consistently growing attack surfaces that create challenges for modern security frameworks [26].…”
Section: Surveys On Threat Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…For this purpose, some ML-jobs have been integrated into the ELK. On other hand, [23] provide a survey on intrusion detection using Deep Learning technique and how a Deep Learning model could be integrated into the ELK Stack.…”
Section: Elk As a Siemmentioning
confidence: 99%