Insider threats and insider intrusion detection

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This survey paper narrates insider threats and their detection types and methods. Insider threats are emerging nowadays, it is important to identify these threats as they are generating critical problems to the system. This paper pays particular attention to the categories of threats and different types of detection methods. Based on different strategies, statistical and machine learning methods for detecting these threats, are identified and summarized here.

Author supplied keywords

Cite

CITATION STYLE

APA

Lekshmipriya, S. B., & Geetha, G. (2019). Insider threats and insider intrusion detection. International Journal of Recent Technology and Engineering, 8(2 Special issue 5), 158–166. https://doi.org/10.35940/ijrte.B1033.0782S519

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free