
Progressions made in Cyber-Security World
SERI-2021 Theme – Cryptography, Applied Cryptography, Cyber Security and Privacy
- 41 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Progressions made in Cyber-Security World
SERI-2021 Theme – Cryptography, Applied Cryptography, Cyber Security and Privacy
About this book
SERI-2021 was a success with the presence of our valuable Guest Speakers who lead the discussion in various session in just the right direction showering the audiences with their esteemed valuable knowledge and insights in the field.The various sessions we had such as "Quad: Cyber security capabilities", "National Interventions and Programs for Security Education", "Cyber First: This and next generation", "Crypto: Releasing possibilities" etc.not only focussed on the present scenario but also defined the futuristic scope of in the filed of cyber-security.The Conference had an interesting competition judged by the top scholarly of cyber-security field as Paper-Presentation which saw number of entries and few finally making it to the top.This book has the top 3 papers presented.Hope you will enjoy surfing through new interventions in the field.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Detection of Malicious Insider in Cloud Environment based on behavior Analysis
I. INTRODUCTION
II. Literature Review
| S.no | Author | Insider Threat Detection Framework applied | Algorithms applied | Observations |
|---|---|---|---|---|
| 1. | Jiang et al. (2018) | User Behavior Analysis | XGBoost, SVM, Random Forest (RF) | User behaviour analysis using XGBoost outperforms other algorithms based on F-measure up to 99.96% to detect the malicious activity using CERT dataset [5] |
| 2. | Eberle and Holder (2009) | Graph based anomaly detection | GBAD-MDL, GBAD-P (probability) and GBAD-MPS (maximum partial substructure) | Graph-based anomaly detection using MDL algorithm identifies the graph-based anomalies such as email, phone traffic and business process to detect the insider threat than Probability and MPS algorithm [6] |
| 3. | Liu and et. (2018) | Anomaly- based Insider detection | Deep Autoencoder (AE) | Deep A.E. detects all malicious insider activity with a reasonable false positive rate using US-CERT data [7] |
| 4. | Diop and et. (2019) | Ensemble Learning Behavior Anomaly Detection Framework | (Forest, One-Class SVM, Local outlier factor (LOF), Elliptic envelope (EE), artificial neural network (ANN), Gaussian naive Bayes (Gnb), Bagging classifiers (Bgc), random forest (RF) and gradient boosting (Gbc) | Ensemble learning behavior using Gbc algorithm outperforms other algorithms with (75%-99%) in both unsupervised learning based testing and supervised learning based testing. An ANN followed this with (60%-99%) result in both tests [8]. |
| 5. | Jiang et al. (2019) | Graph Convolutional Network | RF, SVM, Logistic Regression (LR), Convolutional Neural Network (CNN), Graph Convolutional Network (GCN) | GCN performs better than other algorithm based on accuracy, precision and recall to detect malicious insider and fraud activities [9]. |
| 6. | Kim et al. (2019) | User Behavior Modeling and Anomaly Detection Algorithms | Gaussian density estimation, Parzen window density, Principal component | User behavior modelling and anomaly detection using Parzen and PCA provided a better result than other algorithms to detect malicious insider threats [10]. |
| 7. | Senator et al. (2013) | Detecting Insider Threats in a Real Corporate Database | IP Thief Ambitious Leader Scenario Detector, File Events Indicator Anomaly Detection, Relational Pseudo Anomaly Detection, Repeated Impossible Discrimination Ensemble, Grid- based Fast Anomaly Discovery given Duplicates (GFADD) | The multiple methods detect the malicious insider threat using computer log activity in an actual corporate database [11]. |
| 8. | Lv et al. | Method based on user and role behavior (MURB) and Anomaly Detection (ADAD) | Isolation Forest | MURB outperforms the ADAD with 80% precision and accuracy for detection of the malicious insider threat using CERT data [12]. |
| 9. | Gamachchi and et. (2017) | Graph and anomaly detection Framework | Isolation Forest | The combined graph-based anomaly detection framework identifies 79% of individuals as Genuine users and 31% as malicious insiders with suspicious activity [13]. |
| 10. | Liu et al. (2020) | Behaviour anal... |
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Table of Contents
- Preface
- 1. Detection of Malicious Insider in Cloud Environment based on Behavior Analysis
- 2. Evaluation of Supervised Machine Learning Classifiers to Detect Mobile Malware
- 3. Secure Data Aggregation Process Using Memetic Algorithm in IoT Enabled Wireless Sensor Networks