Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Advanced insider threat detection model to apply periodic work atmosphere

Full metadata record
DC Field Value Language
dc.contributor.authorOh, Junhyoung-
dc.contributor.authorKim, Tae Ho-
dc.contributor.authorLee, Kyung Ho-
dc.date.accessioned2021-09-01T17:10:46Z-
dc.date.available2021-09-01T17:10:46Z-
dc.date.created2021-06-19-
dc.date.issued2019-03-31-
dc.identifier.issn1976-7277-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/66586-
dc.description.abstractWe developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKSII-KOR SOC INTERNET INFORMATION-
dc.titleAdvanced insider threat detection model to apply periodic work atmosphere-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kyung Ho-
dc.identifier.doi10.3837/tiis.2019.03.035-
dc.identifier.scopusid2-s2.0-85065568630-
dc.identifier.wosid000462727200035-
dc.identifier.bibliographicCitationKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.13, no.3, pp.1722 - 1737-
dc.relation.isPartOfKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.titleKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.volume13-
dc.citation.number3-
dc.citation.startPage1722-
dc.citation.endPage1737-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART002454767-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorInsider threat detection-
dc.subject.keywordAuthorMachine learning-
dc.subject.keywordAuthorUnsupervised learning-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorPrivacy Behavior-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Kyung Ho photo

Lee, Kyung Ho
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE