Detecting Insider Threats with Machine Learning Algorithms

Abstract

Computer attacks are often caused by the insider threats. Therefore, building computer systems that are less vulnerable to insider attacks becomes a crucial problem. In this paper, the machine learning program, C4.5 and the rule-learning algorithm, RIPPER were used for detecting insider threats. These techniques were applied to detect misuse intrusions in a distributed system. The patterns of system behavior and the set of related system features were used to learn classifiers that can recognize known intrusions. In this paper, the performances of these techniques were compared and presented.

Department(s)

Computer Science

Second Department

Electrical and Computer Engineering

Keywords and Phrases

Classification; Data streams mining; Distributed systems; Intrusion detection

International Standard Book Number (ISBN)

978-972892440-9

Document Type

Article - Conference proceedings

Document Version

Citation

File Type

text

Language(s)

English

Rights

© 2024 The Open University, All rights reserved.

Publication Date

01 Jan 2020

This document is currently not available here.

Share

 
COinS