Insider threats and insider intrusion detection

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This survey paper narrates insider threats and their detection types and methods. Insider threats are emerging nowadays, it is important to identify these threats as they are generating critical problems to the system. This paper pays particular attention to the categories of threats and different types of detection methods. Based on different strategies, statistical and machine learning methods for detecting these threats, are identified and summarized here.

Author supplied keywords

References Powered by Scopus

Anomaly detection: A survey

8885Citations
N/AReaders
Get full text

A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

415Citations
N/AReaders
Get full text

Detecting and Preventing Cyber Insider Threats: A Survey

295Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Insider Threat Detection and Prevention: New Approaches and Tools

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Lekshmipriya, S. B., & Geetha, G. (2019). Insider threats and insider intrusion detection. International Journal of Recent Technology and Engineering, 8(2 Special issue 5), 158–166. https://doi.org/10.35940/ijrte.B1033.0782S519

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

50%

Professor / Associate Prof. 2

33%

Researcher 1

17%

Readers' Discipline

Tooltip

Computer Science 5

71%

Social Sciences 1

14%

Engineering 1

14%

Save time finding and organizing research with Mendeley

Sign up for free