AD2: Anomaly detection on active directory log data for insider threat monitoring.
Chih-Hung HsiehChia-Min LaiChing-Hao MaoTien-Cheu KaoKuo-Chen LeePublished in: ICCST (2015)
Keyphrases
- anomaly detection
- log data
- data leakage prevention
- insider threat
- detect anomalies
- query intent
- intrusion detection
- data mining techniques
- anomalous behavior
- malicious activities
- network traffic
- monitoring system
- detecting anomalies
- network security
- network intrusion detection
- network anomaly detection
- unsupervised learning
- negative selection algorithm
- one class support vector machines
- intrusion detection system
- security architecture
- metadata
- database
- critical infrastructure
- personal information
- data acquisition
- information retrieval
- databases
- data sets