Anomaly detection systems are a promising tool to identify compromised user credentials and malicious insiders in enterprise networks. Most existing approaches for modelling user behaviour rely on either independent observations for each user or on pre-defined user peer groups. A method is proposed based on recommender system algorithms to learn overlapping user peer groups and to use this learned structure to detect anomalous activity. Results analysing the authentication and process-running activities of thousands of users show that the proposed method can detect compromised user accounts during a red team exercise
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Statistical anomaly detection techniques provide the next layer of cyber-security defences below tra...
There has been increasing interest in deploying data mining methods for fault detection. For the cas...
Anomaly detection systems are a promising tool to identify compromised user credentials and maliciou...
Trust, reputation and recommendation are key components of successful ecommerce systems. However, ec...
While the use of anomaly detection in network security has a long research history, it is rarely use...
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access c...
This paper presents work on automatically characterizing typical user activities across multiple sou...
In network security the organizations are ever growing to identify insider threats. Those who have a...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...
Collaborative filtering recommenders are highly vulner-able to malicious attacks designed to affect ...
Network Intrusion detection System (NIDS) is an intrusion detection system that tries to discover ma...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Statistical anomaly detection techniques provide the next layer of cyber-security defences below tra...
There has been increasing interest in deploying data mining methods for fault detection. For the cas...
Anomaly detection systems are a promising tool to identify compromised user credentials and maliciou...
Trust, reputation and recommendation are key components of successful ecommerce systems. However, ec...
While the use of anomaly detection in network security has a long research history, it is rarely use...
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access c...
This paper presents work on automatically characterizing typical user activities across multiple sou...
In network security the organizations are ever growing to identify insider threats. Those who have a...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
In this dissertation, we examine the machine learning issues raised by the domain of anomaly detecti...
Collaborative filtering recommenders are highly vulner-able to malicious attacks designed to affect ...
Network Intrusion detection System (NIDS) is an intrusion detection system that tries to discover ma...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Statistical anomaly detection techniques provide the next layer of cyber-security defences below tra...
There has been increasing interest in deploying data mining methods for fault detection. For the cas...