The paper describes the methodology of constructing models of typical user behaviour in a distributed information system, which may operate with sensitive data. The model is designed for the detection of abnormal behaviour occurring during the invasion of an intruder in the system. Also, the paper deals with the general approach to the implementation of the model infrastructure and algorithms of the main modules. Moreover, two possible methods for implementing the model in the target system are described
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
Behaviors of authorized users must be monitored and controlled due to the rise of insider threats. S...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The paper describes the methodology of constructing models of typical user behaviour in a distribute...
During the development of the system for anomaly detection in the electronic information system, the...
During the development of the system for anomaly detection in the electronic information system, the...
Abstract: Intrusion detection is used to monitor and capture intrusions into computer and network sy...
We present a complex neural network model of user behavior in distributed systems. The model reflec...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
The issues of building effective software systems for protection against internal intrusions based o...
This paper considers the problem of intrusion detection in information systems as a classification p...
This paper considers the problem of intrusion detection in information systems as a classification p...
described the problem of modeling the behavior of a typical user of an electronic information system...
Abstract: We present a complex neural network model of user behavior in distributed systems. The mod...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
Behaviors of authorized users must be monitored and controlled due to the rise of insider threats. S...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The paper describes the methodology of constructing models of typical user behaviour in a distribute...
During the development of the system for anomaly detection in the electronic information system, the...
During the development of the system for anomaly detection in the electronic information system, the...
Abstract: Intrusion detection is used to monitor and capture intrusions into computer and network sy...
We present a complex neural network model of user behavior in distributed systems. The model reflec...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
The issues of building effective software systems for protection against internal intrusions based o...
This paper considers the problem of intrusion detection in information systems as a classification p...
This paper considers the problem of intrusion detection in information systems as a classification p...
described the problem of modeling the behavior of a typical user of an electronic information system...
Abstract: We present a complex neural network model of user behavior in distributed systems. The mod...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
Behaviors of authorized users must be monitored and controlled due to the rise of insider threats. S...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...