Study on user’s identification system in insider threats

Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the...

Full description

Saved in:
Bibliographic Details
Main Authors: PEI Qing-qi1, ZHAO Peng2, ZHANG Hong-bin3, WANG Chao2, YIN Hao1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74650541/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537680082468864
author PEI Qing-qi1
ZHAO Peng2
ZHANG Hong-bin3
WANG Chao2
YIN Hao1
author_facet PEI Qing-qi1
ZHAO Peng2
ZHANG Hong-bin3
WANG Chao2
YIN Hao1
author_sort PEI Qing-qi1
collection DOAJ
description Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the system can determine the identity of the user.As a result, experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker.
format Article
id doaj-art-4d4d153c76204b91bcc036a11fbd6424
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4d4d153c76204b91bcc036a11fbd64242025-01-14T08:27:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013012112674650541Study on user’s identification system in insider threatsPEI Qing-qi1ZHAO Peng2ZHANG Hong-bin3WANG Chao2YIN Hao1Monitoring user’s abnormal behaviors, which is an effective method to detect impersonation, is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found, the system can determine the identity of the user.As a result, experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker.http://www.joconline.com.cn/zh/article/74650541/insider threatidentificationBayesian networkextended tree augment naive bayesian
spellingShingle PEI Qing-qi1
ZHAO Peng2
ZHANG Hong-bin3
WANG Chao2
YIN Hao1
Study on user’s identification system in insider threats
Tongxin xuebao
insider threat
identification
Bayesian network
extended tree augment naive bayesian
title Study on user’s identification system in insider threats
title_full Study on user’s identification system in insider threats
title_fullStr Study on user’s identification system in insider threats
title_full_unstemmed Study on user’s identification system in insider threats
title_short Study on user’s identification system in insider threats
title_sort study on user s identification system in insider threats
topic insider threat
identification
Bayesian network
extended tree augment naive bayesian
url http://www.joconline.com.cn/zh/article/74650541/
work_keys_str_mv AT peiqingqi1 studyonusersidentificationsystemininsiderthreats
AT zhaopeng2 studyonusersidentificationsystemininsiderthreats
AT zhanghongbin3 studyonusersidentificationsystemininsiderthreats
AT wangchao2 studyonusersidentificationsystemininsiderthreats
AT yinhao1 studyonusersidentificationsystemininsiderthreats