【24h】

Graph-based approaches to insider threat detection

机译:基于图的内部威胁检测方法

获取原文

摘要

This work presents the use of graph-based approaches to discovering anomalous instances of structural patterns in data that represent entities, relationships and actions. Using the minimum description length (MDL) principle to first identify the normative pattern, the algorithms presented in this paper identify the three possible changes to a graph: modifications, insertions and deletions. Each algorithm discovers those substructures that match the closest to the normative pattern without matching exactly. As a result, this proposed approach searches for those activities that appear to match normal (or legitimate) transactions, but in fact are structurally different. After briefly presenting the three algorithms, we then show the usefulness of applying these graph theoretic approaches to discovering illegal activity for a simulated insider threat within a passport processing scenario.
机译:这项工作介绍了基于图形的方法,以发现代表实体,关系和动作的数据中的结构模式的异常情况。使用最小描述长度(MDL)原则首先识别规范模式,本文中呈现的算法标识图形:修改,插入和删除的三种可能的变化。每种算法都发现那些匹配最接近规范模式的子结构,而不完全匹配。因此,这一提出的方法搜索了那些似乎匹配正常(或合法)事务的活动,但实际上是在结构上不同的。在简要介绍三种算法之后,我们显示了应用这些图形理论方法,以在护照处理场景中发现非法活动的应用方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号