首页> 外文会议>5th annual workshop on cyber security and information intelligence research 2009 >A traceability link mining approach for identifying insider threats
【24h】

A traceability link mining approach for identifying insider threats

机译:可追溯性链接挖掘方法,用于识别内部威胁

获取原文

摘要

In this paper, we present an insider attack detection model that is designed to profile traceability links based on document dependencies and calendar-based file usage patterns for detecting insider threats. This model is utilized to detect insiders' malicious activities targeted at tampering the contents of files for various purposes. We apply the concept of traceability links in the software engineering field to this research. Our approach mainly employs document dependency traceability links for constructing insider attack detection model.
机译:在本文中,我们提出了一种内部攻击检测模型,该模型旨在根据文档依赖关系和基于日历的文件使用模式来分析可跟踪性链接,以检测内部威胁。此模型用于检测内部人员的恶意活动,这些活动旨在篡改文件内容以用于各种目的。我们在软件工程领域中应用了可追溯性链接的概念。我们的方法主要利用文档依赖关系可追溯性链接来构建内部攻击检测模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号