Detailed Information

Cited 4 time in webofscience Cited 3 time in scopus
Metadata Downloads

An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

Full metadata record
DC Field Value Language
dc.contributor.authorYe, Xiaoyun-
dc.contributor.authorHan, Myung-Mook-
dc.date.accessioned2022-02-11T02:40:17Z-
dc.date.available2022-02-11T02:40:17Z-
dc.date.created2021-02-01-
dc.date.issued2022-01-
dc.identifier.issn2056-4961-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83465-
dc.description.abstractPurpose: By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior is normal within a continuous period. Design/methodology/approach: Feature extraction of five parts of the time series by rules and sorting in chronological order. Use the obtained features to calculate the probability parameters required by the HMM model and establish a behavior model for each user. When the user has abnormal behavior, the model will return a very low probability value to distinguish between normal and abnormal information. Findings: Generally, HMM parameters are obtained by supervised learning and unsupervised learning, but the hidden state cannot be clearly defined. When the hidden state is determined according to the data set, the accuracy of the model will be improved. Originality/value: This paper proposes a new feature extraction method and analysis mode, which determines the shape of the hidden state according to the situation of the data set, making subsequent HMM modeling simple and efficient and in turn improving the accuracy of user behavior detection. © 2020, Emerald Publishing Limited.-
dc.language영어-
dc.language.isoen-
dc.publisherEmerald Group Holdings Ltd.-
dc.relation.isPartOfInformation and Computer Security-
dc.titleAn improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000613096000001-
dc.identifier.doi10.1108/ICS-12-2019-0142-
dc.identifier.bibliographicCitationInformation and Computer Security, v.30, no.1, pp.19 - 36-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85099772532-
dc.citation.endPage36-
dc.citation.startPage19-
dc.citation.titleInformation and Computer Security-
dc.citation.volume30-
dc.citation.number1-
dc.contributor.affiliatedAuthorYe, Xiaoyun-
dc.contributor.affiliatedAuthorHan, Myung-Mook-
dc.type.docTypeArticle-
dc.subject.keywordAuthorAnomaly detection-
dc.subject.keywordAuthorHidden Markov model-
dc.subject.keywordAuthorInsider threat detection-
dc.subject.keywordAuthorViterbi algorithm-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 소프트웨어학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Han, Myung Mook photo

Han, Myung Mook
IT (Department of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE