Hunting for Insider Threats Using LSTM-Based Anomaly Detection.
Miguel Villarreal-VasquezGaspar Modelo-HowardSimant DubeBharat K. BhargavaPublished in: IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
- anomaly detection
- insider threat
- computer security
- intrusion detection
- cyber security
- intrusion detection system
- detecting anomalies
- recurrent neural networks
- one class support vector machines
- unsupervised anomaly detection
- anomalous behavior
- network traffic
- detecting anomalous
- network intrusion detection
- network anomaly detection
- unsupervised learning
- security architecture
- critical infrastructure
- network security
- detect anomalies
- behavior analysis
- network intrusion
- negative selection algorithm
- information security
- malware detection
- security issues
- identity theft
- connectionist systems
- computer vision