Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti...
详细信息
ISBN:
(纸本)9798350362480
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulting in less attention and development in this critical area. Conventional ITD approaches often rely heavily on event-driven approaches. On top of that, researchers developed various rule-based methods to conquer the tasks. Based on that, we often ignore the intrinsic temporal relationships that are naturally built in between events that occur in different moments. For instance, we may easily understand events with causality such as one anomalous event followed by another specific event to complete a malicious action;however, may not be aware of events that occur around 9 am every morning during working hours. In our opinion, we attempt to re-consider the temporal behavior to extract the information hidden in cyberspace activities. Specifically, some effective sentence embeddings can assist us in providing informative internal representations to summarize temporal behaviors in the temporal activity sequences to make the right judgment on insider threat detection. In this paper, we propose a novel methodology for insider threat detection that emphasizes temporal relationship modeling on top of already-matured event sequence analysis to effectively catch insider threats. The proposed approach leverages contrastive sentence embeddings to learn users' intentions in sequences, followed by the deployment of a user-level and event-level Contrastive Learning (euCL) model to incorporate temporal behaviors with user behavior embeddings. To validate the proposed methodology, we conduct extensive analyses and experiments using the publicly available CERT dataset. The results demonstrate the effectiveness and robustness of the proposed method in detecting insider threats and identifying malicious scenarios, highlighting its potential for enhancing cybersecurity measur
Lung diseases are wide group of diseases related to the respiratory system, and is ranging from acute infections to chronic disorders with multifactorial causes. Recognition of the lung disease is very crucial in the ...
详细信息
Credentials are one of the most important things to prove oneself in modern society. As the world goes digital, credentials change its form from paper to digital. However, digital data are easy to be forged and to be ...
详细信息
This study examines the design of fault tolerance mechanisms in cloud computing infrastructure, with particular emphasis on Amazon Web Services (A WS). Fault tolerance is critical to assure the continuous availability...
详细信息
Using text mining tools and machine learning algorithms, the paper presents a prototype for classifying strokes. The significance of machine learning extends across various domains, including surveillance, medicine, a...
详细信息
Real-time video transmission via unmanned aerial vehicles (UAVs) is significantly impacted by latency issues. Using Region of Interest (ROI) tile segmentation methods, video streaming techniques can dynamically adjust...
详细信息
Worldwide, breast cancer is becoming the most serious illness that affects women. It is believed that early diagnosis and treatment of breast cancer can increase survival rates and decrease the need for surgery. Machi...
详细信息
Periapical lesions are abnormal growths or infections that develop close to the tip of a tooth's root and can be caused by oral trauma, decaying teeth, or dental work done in the past. It is particularly difficult...
详细信息
Ridesharing systems have become an important part of urban transportation. At the same time, electric vehicle (EV) adoption is also growing at a fast pace as an eco-friendly and sustainable transportation option. To o...
详细信息
Oral health is vital to overall well-being but is often overlooked due to inefficient monitoring tools and delayed diagnosis. This project presents a smart handheld device featuring a miniaturized camera for detecting...
详细信息
暂无评论