Hunting for Insider Threats Using LSTM-Based Anomaly Detection

Insider threats are one of the most difficult problems to solve, given the privileges and information available to insiders to launch different types of attacks. Current security systems can record and analyze sequences from a deluge of log data, potentially becoming a tool to detect insider threats...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2023-01, Vol.20 (1), p.451-462
Hauptverfasser: Villarreal-Vasquez, Miguel, Modelo-Howard, Gaspar, Dube, Simant, Bhargava, Bharat
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!