2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) 2022
DOI: 10.1109/mysurucon55714.2022.9972599
|View full text |Cite|
|
Sign up to set email alerts
|

Retracted: Enhancing Collaborative Intrusion detection networks against insider attack using supervised learning technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Additionally, the success of Log2Graph relies on the quality of feature engineering, the choice of relevant graph algorithms, and the adaptability to evolving threat VOLUME 4, 2016 scenarios. In another study employing graph neural network [34], the authors achieve robust anomaly-based insider threat detection using a Multi-Edge Weight Relational Graph Neural Network (MEWRGNN) approach. The technique combines GCN with anomaly detection to capture the contextual relationship of user behaviors over time, enabling accurate identification of insider threats.…”
Section: Learning-based Insider Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the success of Log2Graph relies on the quality of feature engineering, the choice of relevant graph algorithms, and the adaptability to evolving threat VOLUME 4, 2016 scenarios. In another study employing graph neural network [34], the authors achieve robust anomaly-based insider threat detection using a Multi-Edge Weight Relational Graph Neural Network (MEWRGNN) approach. The technique combines GCN with anomaly detection to capture the contextual relationship of user behaviors over time, enabling accurate identification of insider threats.…”
Section: Learning-based Insider Detection Techniquesmentioning
confidence: 99%
“…Addressing these challenges requires a collaborative effort involving cybersecurity researchers, software developers, organizational leaders, and legal experts. The deployment of insider threat detection systems in real security environments demands a nuanced approach that considers not only technical aspects but also navigates the intricacies of organizational dynamics and regulatory landscapes [34], [39]. In conclusion, addressing malicious insider threats involves a multifaceted approach that combines technical solutions, employee training, and organizational policies.…”
Section: Challenges and Open Problemsmentioning
confidence: 99%
“…However, because workload is outsourced, this company also introduced new threats and attacks. The most pressing issues with cloud-based solutions are: a) an absence of information controls in mists that make veil intricacy issues for FSIs [17] on the grounds that private mists become standard in FinTech. Federated ML was the focus of work [18] and author [19] presentations of FL's current advanced and unsolved issues.…”
Section: Existing Fintech Intrusion Detection Systemmentioning
confidence: 99%