Enviar pesquisa
Carregar
Automatic Insider Threat Detection in E-mail System using N-gram Technique
•
0 gostou
•
32 visualizações
IRJET Journal
Seguir
https://irjet.net/archives/V4/i11/IRJET-V4I11319.pdf
Leia menos
Leia mais
Engenharia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
Alexander Decker
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...
IJECEIAES
Recomendados
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
Alexander Decker
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
IJNSA Journal
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...
IJECEIAES
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
IJAAS Team
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
IJNSA Journal
rpaper
rpaper
imu409
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
CSCJournals
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
A45010107
A45010107
IJERA Editor
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
ijcsit
E1802052327
E1802052327
IOSR Journals
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
ijcsa
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A Survey
IJERA Editor
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
IDES Editor
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET Journal
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
theijes
Mais conteúdo relacionado
Mais procurados
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
IJAAS Team
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
IJNSA Journal
rpaper
rpaper
imu409
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
IJNSA Journal
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
CSCJournals
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
A45010107
A45010107
IJERA Editor
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
ijcsit
E1802052327
E1802052327
IOSR Journals
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
ijcsa
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A Survey
IJERA Editor
Mais procurados
(18)
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
rpaper
rpaper
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using IDS Technique
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
A45010107
A45010107
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
E1802052327
E1802052327
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A Survey
Semelhante a Automatic Insider Threat Detection in E-mail System using N-gram Technique
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
IDES Editor
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET Journal
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
theijes
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
CSITiaesprime
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
Security Introspection for Software Reuse
Security Introspection for Software Reuse
IRJET Journal
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
IJCSIS Research Publications
Intrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET Journal
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
IJNSA Journal
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
Only Abstract
Only Abstract
guesta67d4a
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
IRJET Journal
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET Journal
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection
AM Publications,India
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
Semelhante a Automatic Insider Threat Detection in E-mail System using N-gram Technique
(20)
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
Security Introspection for Software Reuse
Security Introspection for Software Reuse
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
Intrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Only Abstract
Only Abstract
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
Mais de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mais de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
timesproduction05
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
rknatarajan
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Prabhanshu Chaturvedi
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
Último
(20)
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Automatic Insider Threat Detection in E-mail System using N-gram Technique
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1756 Automatic Insider Threat Detection in E-mail System Using N-gram Technique Aishwarya Potu1, Snehal Mane2, Akshay Kondhalkar3, Pooja Talathi4, Aparna Hambarde5 1,2,3,4BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India 5Prof, Dept. of Computer Engineering, KJCOEMR, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Managing organisational cyber security is the threat that comes from those who operate within the organisation is one of the greatest challenges .It is becominga serious and increasing concern and those who have fallen victim to such attacks suffering significant damagesincluding reputation and financial. Hence an effective approach for insider threat detection is necessary. To classify documents in order to detect and prevent leakage of sensitive data n-gram frequency is used. In the system for detection of sensitive data using N-gram technique if the user sending sensitive information through email to outside network, it will get verified first on server-side using SHA, N-GRAM andThreshold based system. And after verification if threat found, the user gets blocked. Key Words: Cyber security, Data leakage, Insider threat, N-gram, SHA, Threshold frequency. 1. INTRODUCTION The insider threat problem is one that is constantly growing in magnitude, resulting in significant damage to businesses and organizations alike. The employees who work in an organization are often trusted with highly confidential information such as intellectual property, financial records, and customer accounts, in order to perform their job. If an individual should choose to abuse this trust and act maliciously toward the organization, then their position within the organization, their knowledge of the organizational systems, and their ability to access such materials means that they can pose a serious threat to the operation of the business. Media has reported and exposed numerous cases in recent years of both government and businesses who have beencompromised,whereconfidential information has been exfiltrated and exposed. The threat posed by insiders is real, and it requires serious attention by both organizations and individuals. Capelli et al. from the Carnegie Mellon University Computer Emergency Response Team (CMU-CERT) group identified three main groups of insider threat : information technology sabotage, theft of intellectual property, and fraud data. Over the years, technological advancements have meant that the way organizations conduct business is constantly evolving.Ithas become a common practice nowadays foremployeestohave access to large repositories of organization documents electronically stored on distributed file servers. Many organizations provide their employees with company laptops for working while on the move and use e-mail to organize and schedule appointments. For hosting meetings across the globe, services such as video conferencing are frequently used . Employees are constantly connectedtothe Internet where they can obtain information of anything that they require for conducting their workload. The technological advancements could potentiallymakeiteasier for insiders to attack. One advantage of the organizational view to this is the capability of capturing activity logs that may provide insight into the actions ofemployees.Duetothe sheer volume of activity being conducted by employees every day, analyzing such activity logs would be infeasible for any analyst. What is required is a capability to analyze individual users who conduct business on organizational systems, to assess when users are behaving normally and when users are posing a threat. 2. LITERATURE SURVEY 1) Title- Automated Insider Threat Detection System Using User and Role- Based Profiling Assessment : In this paper, systematic approach for insider threat detection and analysis based on the concept of anomaly detection is presented. The system constructs a tree- structured profiles with reference to given a large collection of activity log data that describe individual user activityand combined role activity. They have constructed a feature set representation that describes the observations made for each day and the variations that are exhibited between the current day and the previously observed days[1]. 2) Title- Caught in the Act of an Insider Attack : In this paper, a systematic approach for insider threat detection and analysis is presented. The system constructs a tree-structured profile from activity log data that is collected on users within the organizationsfor eachuserand for each role. This allows multiple activity types to be represented in a unified approach, that helps to support comparison between different usersandassociated roles[2]. 3) Title- Word N-gram Based Classification for Data Leakage Prevention : The objective of this paper is to prove the effectiveness of N- grams to measure the similarity betweenregulardocuments and existing classified documents. N-grams for data classification purposes is useable based on using the N- grams frequency to classifydocumentsinordertodetectand prevent leakage of sensitive data[3].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1757 4) Title- Automated Big Text Security Classification : In this paper, they have analyzed a dataset that contains actual formerly sensitive information annotated at paragraph granularity. Automated ClassificationEnabled by Security Similarity (ACESS) penetrates the complexityofbig text security classification. Approach inthispaperaddresses the issue by partitioning a large text into smaller groups of similar paragraphs wherein multiple similarity-based classification models to predict a paragraph’s security label[4]. 5) Title- Visualizing the Insider Threat: Challenges and tools for Identifying malicious user activity : In this paper, a visual analytics approach is proposed to detect the insider threat. With the help of a detailed activity visualization, it is possible to the analyst to explore the raw activity data and to check whether the user poses a threat to the organisation or not. The topics such as insider threat research, anomaly detection, and security data visualization are used. It helps to understand the detection and visualization which can help with the separation between the malicious and non-malicious activity[5]. 6) Title- Mining Software Component Interactions to Detect Security Threats at the Architectural Level : The main objective of this paper is to present an innovative data mining approach to detect anomalous behavior to interact among the softwarecomponentsatthearchitectural level. The EDS (Emergency Deployment System) is a real world software system which is used to define and evaluate the research. To detect more sophisticated threats it is important to monitor and assess theoverall securityposture of a software system at the architectural level. A use case driven mining framework is proposed with an adaptive detection algorithm to identify the potential malicious threats[6]. 7) Title- A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems : In this paper, a Model Based Approach is presented to predict the confusion matrix between insider threat detection system alerts and the truth whether the user is an insider or not. To evaluate a predictive model, datasets into which insiders have been injected or estimated the actual performance of the insider threat detection system are developed. A simple approach for modeling insider threat detection systems that relies on a small amount of the non user-specific data is described[7]. 8) Title- Cyber security for Product Lifecycle Management A Research Roadmap : In this paper, they have discussed present landscape with respect to the major cyber security risks. They have introduced a research focusing on cyber security in the context of product lifecycle management. Itincluderesearch directions on critical protection techniques, including protection techniques from insider threat, access control systems and secure supply chains. AnoverviewofDBSAFE,a system for protecting data from insider threat is presented[8]. 9) Title- Dynamic Defense Strategy against Advanced Persistent Threat with Insiders : In this paper, they have investigated the joint threats from the APT attacker and insiders over a long time-span within a general framework. The results in this paper can shade insights on practical system design for higher securitylevels facing the joint APT and insider threats[9]. 10) Title- Modeling Insider Threat Types in Cyber Organizations : In this paper, they have presented a computational framework to model insiders using relevant cultural, social, emotional, and other behavioral factors, along with technological factors, with the goal of categorizing them based on the type of threat they are likely to present to the organization. The proposed method provides an efficient relative measure of each person’s awareness for different types of manipulations and it captures both short term and long term factors impacting their awareness[10]. 3.1 N-gram Technique The N-Gram technique is used to break each word in the document into smaller character N-grams. To create an N- gram profile, the smaller character n-grams are rearranged based on the N-gram frequency. The created N-gram profile are compared with existing category N-gram profiles. The document are classified underthecategorywiththesmallest distance measure. Fig-1: Word N-gram classification process 3. TECHNIQUES
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1758 3.2 SHA Secure Hash Algorithm 1 (SHA1) is a cryptographic hash function which is designed by the United States National Security Agency . SHA-1 produces a 20-byte hash value known as a message digest. A SHA-1 hash value is a hexadecimal number i.e 40 digits long. It execute by transforming the data using a hash function. It uses an algorithm that consists of modular additions, bitwise operations and compression functions. A fixed size string produced by hash function looks nothing like the original. To be one-way functions the algorithms are designed i.e. once they are transformed into their respective hash values then it is virtually impossible to transform them back into the original data. SHA algorithms are designed and modified with increasinglystronger encryptiontechnique inresponse to hacker attacks. 3.3 Threshold Frequency Threshold is a value. We associate the Threshold to a statistic. Data is collected for that statistic, then it is compared with the associated Threshold value. If the collected data value does not warrant the Threshold value, then it indicates that this type of data might lead to poor performance of the network or device. Threshold value is set up along with a level such as the maximum value, equal value and the minimum value. When the collected value exceeds the threshold value,notification,whichwereceiveis in the form of a Threshold Event. An event is an occurrence of any action. Whenever a threshold value has exceeded, a threshold event is generated. Also, every Threshold event is associated with a Severity to denote how critical the situation is. The total count number of sensitive word frequency is compared with threshold value, the log is maintained and the appropriate action is taken, i.e. in email system, to block the mail or send it. 4 EXISTING SYSTEM A tree-structure profiling approach incorporates the details of activities done by each of the user and job role and then use this to obtain a consistent representationoffeaturesthat gives a rich description of the user’s behavior. Deviation can be assessed with reference to the amount of variance that each user exhibits across multiple attribute by comparing against their peers[1]. Following are the requirements of the detection system : 1) The system must be featured in such a way that it should be able to determine a score for each of the user that relates to the threat that they currently pose. 2) The system should be expert to deal with various forms of insider threat, including sabotage, intellectual property theft, and fraud data. 3) The System should have the ability to deal with the unknown cases of insiderthreat,wherebythethreat is decided to be an anomaly for that user and for that role. 4) The system also should be able to detect the threat that an individual poses based on howthis behavior deviates from both theirown previousbehaviorand the behavior exhibited by those in a similarjob role. 5 PROPOSED SYSTEM The main objective of the system is to detect the suspicious mail sent by the insider threat. The mail is being sent from client using SOAP (Simple Access Object Protocol). Once it is received on the server side, JAVA API is usedtosendemailto particular receipt. Fig-2: Proposed system scenario Every authorized registered client will begivenaloginId and Password to access to the system. On theserversidedatabase is maintained. The database contains all the sensitive word list, files and documents. Admin maintains the email logs, manage block list, manage white list and black list. The admin has the right to block the user if any illegal activities are caught With the reference to the previous work done, the objective of the project is to develop an application to detect insider threat in E-mail system. In this system when the user sending sensitive information to outsidenetworks,itwill get verified first on server-side using SHA, N- GRAM and Threshold based system. The log is maintained by Admin. And after verification if sensitive information found, the user gets blocked. 6. CONCLUSION
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1759 REFERENCES [1] “Automated Insider Threat DetectionSystemUsing User and Role- Based Profiling Assessment”, Philip A. Leg, Oliver Buckley, Michael Goldsmith, and Sadie Creese, 2015 [2] “Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat “, Philip A. Legg, Oliver Buckley, Michael, Goldsmith and Sadie Creese ,Cyber Security Centre, University of Oxford, UK. , 2015 [3] “Word N-gram Based Classification for Data Leakage Prevention”, Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy, Faculty of Science, Environment, Engineering and Technology, Griffith University Gold Coast Campus, Australia, 2013 [4] “Automated Big Text Security Classification”, Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boultand C. Edward Chow, University of Colorado at Colorado Springs Department of Computer Science Vision and Security Technology (VAST) Lab, 2015 [5] “Visualizing the Insider Threat: Challenges and tools for Identifying malicious user activity”, Philip A. Legg, 2015 [6] “Mining Software Component Interactions to Detect Security Threats at the Architectural Level” , Eric Yuan And Sam Malek, 2016. [7] “A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems”, Shannon C. Roberts, John T.Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, William W. Australian MIT Lincoln Laboratory, 2016 [8] “Cyber security for Product Lifecycle Management A Research Roadmap”, 2015. [9] “Dynamic Defense Strategy againstAdvancedPersistent Threat with Insiders”, Pengfei Hu, Hongxing Li Hao Fu, Derya Cansever and Prasant Mohapatra, Department of Computer Science, University of California, Davis, USA [10] “Modeling Insider ThreatTypesinCyberOrganizations”, Eunice E. Santosa,c, Eugene Santos Jr. b,d, John Korah a,e, Jeremy E. Thompson b, Vairavan Murugappana, Suresh Subramaniana, Yan Zhao B, 2017 [11] P. A. Legg et al., “Towards a conceptual model and reasoning structure for insider threat detection,” J. Wireless MobileNetw.,UbiquitousComput., Dependable Appl., vol. 4, no. 4, pp. 20–37, Dec. 2013. [12] J. R. C. Nurse et al., “Understanding insider threat: A framework for characterising attacks,” in Proc. IEEE SPW, 2014 [13] L. Spitzner, “Honeypots: Catching the insider threat,” in Proc. 19th IEEE ACSAC, Las Vegas, NV, USA, Dec. 2003 [14] G. B. Magklaras and S. M. Furnell, “Insider threat prediction tool: Evaluating the probabilityofITmisuse,” Comput. Security, vol. 21, no. 1, pp. 62–73, 1st Quart. 2002. [15] J. Myers, M. R. Grimaila, and R. F. Mills, “Towards insider threat detection using web server logs,” in Proc. 5th Annu. CSIIRW—Cyber Security Inf. Intell. Challenges Strategies, New York, NY, USA, 2009 [16] O. Brdiczka et al., “Proactive insider threat detection through graph learning and psychological context,” in Proc. IEEE Symp. SPW, San Francisco, CA, USA, May 2012 [17] W. Eberle, J. Graves, and L. Holder, “Insider threat detection using a graph-based approach,” J. Appl. Security Res., vol. 6, no. 1, pp. 32–81, Dec. 2010. [18] “AD2: Anomaly Detection on Active Directory Log Data for Insider Threat Monitoring”, 2016
Baixar agora