Anomaly Threat Detection System using User and Role-Based Profile Assessment
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the users behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy
Design of Low Power Dynamic Comparator using Reversible Logic
The Performance of circuits based in CMOS transistor logic is close to reaching its limit. A new efficient system or technology is needed to provide solutions to computing and integration issue. The proposed work address...
Secure Data Transmission in VANETs
A number of technical problems are arising with the widespread distribution of vehicular ad-hoc networks. Privacy and authentication mechanisms are of major concern. If security is not integrated with the system, it lead...
WiFi Based Gas Pipe Leakage Detector Insect Robot using PI3
Security has been major issue in industry and house. Here number of Accidents are increasing day by day. Here, we saw many examples in our day to day life about those accidents that are being occurred due to combustible...
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
"The rising concern for beneficial, easy design and deployable, flexible, reliable, cost effective and scalable wireless network has led to the evolution of mobile Ad hoc networks MANETs . This type of network in its own...
Mercuric Chloride Induced Oxidative Stress and Antioxidant Enzymes in Labeo Rohita as Biomarker
In recent years, heavy metal pollution has become a global environmental threat both ocean and inland fresh waste eco systems. Several aquatic systems were polluted by heavy metals from the industrial discharges. The dis...