Graph clustering and anomaly detection of access control log for forensic purposes.
Hudan StudiawanChristian PayneFerdous SohelPublished in: Digit. Investig. (2017)
Keyphrases
- anomaly detection
- access control
- graph clustering
- intrusion detection
- network analysis
- clustering method
- bipartite graph
- community detection
- network traffic
- role based access control
- network security
- weighted graph
- security policies
- unsupervised learning
- intrusion detection system
- spectral clustering
- link prediction
- k means
- computer security
- security architecture
- graph model
- hidden markov models
- clustering algorithm
- social networks