Anomaly Threat Detection System using User and Role-Based Profile Assessment

Abstract

In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the users behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy

Authors and Affiliations

Keywords

Related Articles

An Initiative on Quality Assessment in the Title II Based Safe Motherhood and Child Survival Program of Catholic Relief Services, Lucknow, UP, India

The current article is about the quality assessment of health program of Catholic Relief Services CRS , Lucknow during the period from 1996 to 2001. The name of the program was Safe Motherhood and Child Survival SMCS pro...

Women Entrepreneurship in India

Women Entrepreneurs may be defined as the women or a group of women who initiate, organize and operate a business enterprise. Government of India has defined women entrepreneurs as an enterprise owned and controlled by a...

Design of Ice Manufacturing Plant 2000 lb

Ice has been used for hundreds of years for short time preservation of food and still it is used to preserve cool drinks and food for short period. There are many types of ice manufacturing plants. They are divided by th...

Study on Ratio Analysis

Financial ratios are an important technique of the financial analysis of a business organization. Effective financial management is the key to running a financially successful business. Ratio analysis is critical for hel...

A Result on Novel Approach for Load Balancing in Cloud Computing

Cloud computing is a large pool of system in which private or public networks are interconnected in order to provide the scalable infrastructure to application, data and file storage. It is considered as the computer arc...

Download PDF file
  • EP ID EP359738
  • DOI -
  • Views 42
  • Downloads 0

How To Cite

(2018). Anomaly Threat Detection System using User and Role-Based Profile Assessment. International Journal of Trend in Scientific Research and Development, 2(3), -. https://europub.co.uk/articles/-A-359738