Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2
CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649
- 20 August 2020
Abstract In the information era, the core business and confidential information of
enterprises/organizations is stored in information systems. However, certain malicious
inside network users exist hidden inside the organization; these users intentionally or
unintentionally misuse the privileges of the organization to obtain sensitive information
from the company. The existing approaches on insider threat detection mostly focus on
monitoring, detecting, and preventing any malicious behavior generated by users within an
organization’s system while ignoring the imbalanced ground-truth insider threat data
impact on security. To this end, to be able to detect insider threats more effectively, a data… More >