Abnormality Detection in Diverse Network Utilizing Machine Learning

Shruti Biradar, Chandrashekhar B. S.

Abstract


It exhibits a versatile framework for high-throughput ongoing investigation of heterogeneous information streams. The engineering empowers incremental advancement of models for prescient investigation and inconsistency recognition as information touches base into the framework. Interestingly with cluster information handling frameworks, for example, Hadoop that can have high expectancy, the design considers ingest and investigation of information on the fly, in this way distinguishing and reacting to strange conduct in close ongoing. This convenience is imperative for applications, for example, insider danger, monetary extortion, and system interruptions. It exhibit a use of this framework to the issue of identifying insider dangers, to be specific, the abuse of an association's assets by clients of the framework and present after effects of the investigations on an openly accessible insider risk dataset.


Full Text:

PDF

References


J. Lewis and S. Baker, ―The Economic Impact of Cybercrime and Cyber Espionage,‖ Centre Strategic Int. Stud., Washington, DC, USA, Tech. Rep., Jul. 2013. [Online]. Available: http://www.mcafee.com/us/ resources/reports/rp-economic-impact-cybercrim e.pdf

T. Stapleton, ―Data Breach Cost,‖ Zurich Amer. Insurance Corp., Schaumburg, IL, USA, Tech. Rep., July 2012. [Online]. Available: http:// http://www.zurichna.com/

C. Miller, ―Revelations of NSA Spying Cost US Tech Companies,‖ Mar. 2014. [Online]. Available: http://www.nytimes.com/ 2014/03/22/business/fallout-from-snowden-hurting -bottom-line-of-techcompanies. Html

M. Riley, ―Exxon, Shell, BP Said to Have Been Hacked Through Chinese Internet Servers,‖ Feb. 2011. [Online].

Available: http://www. bloomberg.com/news/2011-02-24/exxon-shell-bp-said-to-have-be enhacked- through-chinese-internet-servers.html

The CERT Division and ExactData LLC. Insider threat tools, the cert division. [Online]. Available: https://www.cert.org/insider-threat/tools/. Accessed on: Dec. 2015.

J. Glasser and B. Lindauer, ―Bridging the gap: A pragmatic approach to generating insider threat data,‖ in Proc. IEEE Security PrivacyWorkshops, 2013, pp. 98–104.

Wave—Data Protection. [Online]. Available: https://wave.com/dataprotection. Accessed on: Feb. 2014.

SureView, Raytheon Institute. [Online]. Available: https://www.trustedcs.com/products/SureView.html. Accessed on: Feb. 2014.

A. Cummings, T. Lewellen, D. McIntire, A. P. Moore, and R. F. Trzeciak, ―Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector,‖ Softw. Eng. Inst., Carnegie Mellon Univ., Pittsburgh, PA, USA, Tech. Rep., Jul. 2012. [Online]. Available:

http://www.sei.cmu.edu/reports/12sr004.pdf

Palisade—Cyber Security Intelligence Management, Lockheed Martin. [Online]. Available: http://www.lockheedmartin.com/us/what-we-do/ information-technology/cyber-security/cyber-intelligence-enterprise. html. Accessed on: Feb. 2014.


Refbacks

  • There are currently no refbacks.