Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment.
Asha SD. ShanmugapriyaG. PadmavathiPublished in: Comput. Electr. Eng. (2023)
Keyphrases
- anomaly detection
- insider threat
- sampling methods
- malicious activities
- intrusion detection system
- intrusion detection
- security architecture
- network traffic
- random sampling
- normal behavior
- detect anomalies
- normal traffic
- data streams
- class imbalance
- sampling algorithm
- malware detection
- unsupervised learning
- misuse detection
- computer networks
- false positive rate
- original data
- active learning
- pattern recognition
- feature selection
- data sets