Study on user’s identification system in insider threats
Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74650541/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537680082468864 |
---|---|
author | PEI Qing-qi1 ZHAO Peng2 ZHANG Hong-bin3 WANG Chao2 YIN Hao1 |
author_facet | PEI Qing-qi1 ZHAO Peng2 ZHANG Hong-bin3 WANG Chao2 YIN Hao1 |
author_sort | PEI Qing-qi1 |
collection | DOAJ |
description | Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the system can determine the identity of the user.As a result, experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker. |
format | Article |
id | doaj-art-4d4d153c76204b91bcc036a11fbd6424 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-4d4d153c76204b91bcc036a11fbd64242025-01-14T08:27:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013012112674650541Study on user’s identification system in insider threatsPEI Qing-qi1ZHAO Peng2ZHANG Hong-bin3WANG Chao2YIN Hao1Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the system can determine the identity of the user.As a result, experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker.http://www.joconline.com.cn/zh/article/74650541/insider threatidentificationBayesian networkextended tree augment naive bayesian |
spellingShingle | PEI Qing-qi1 ZHAO Peng2 ZHANG Hong-bin3 WANG Chao2 YIN Hao1 Study on user’s identification system in insider threats Tongxin xuebao insider threat identification Bayesian network extended tree augment naive bayesian |
title | Study on user’s identification system in insider threats |
title_full | Study on user’s identification system in insider threats |
title_fullStr | Study on user’s identification system in insider threats |
title_full_unstemmed | Study on user’s identification system in insider threats |
title_short | Study on user’s identification system in insider threats |
title_sort | study on user s identification system in insider threats |
topic | insider threat identification Bayesian network extended tree augment naive bayesian |
url | http://www.joconline.com.cn/zh/article/74650541/ |
work_keys_str_mv | AT peiqingqi1 studyonusersidentificationsystemininsiderthreats AT zhaopeng2 studyonusersidentificationsystemininsiderthreats AT zhanghongbin3 studyonusersidentificationsystemininsiderthreats AT wangchao2 studyonusersidentificationsystemininsiderthreats AT yinhao1 studyonusersidentificationsystemininsiderthreats |