Attributes | Values |
---|
rdf:type
| |
Description
| - It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the non-negative matrix factorization approach could be also an ideal candidate to detect internal threats.
- It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicated they have had attacks reported internally. Insider Attacks are an unusual type of threat which are also serious and very common. Unlike an external intruder, in the case of internal attacks, the intruder is someone who has been entrusted with authorized access to the network. This paper presents a Non-negative matrix factorization approach to detect inside attacks. Comparisons with other established pattern recognition techniques reveal that the non-negative matrix factorization approach could be also an ideal candidate to detect internal threats. (en)
|
Title
| - Detecting Insider Attacks Using Non-negative Matrix Factorization
- Detecting Insider Attacks Using Non-negative Matrix Factorization (en)
|
skos:prefLabel
| - Detecting Insider Attacks Using Non-negative Matrix Factorization
- Detecting Insider Attacks Using Non-negative Matrix Factorization (en)
|
skos:notation
| - RIV/61989100:27240/09:00020977!RIV10-GA0-27240___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61989100:27240/09:00020977
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - intrusion detection; non-negative matrix factorization (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Fifth International Conference on Information Assurance and Security, 2009. IAS '09
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Krömer, Pavel
- Platoš, Jan
- Snášel, Václav
- Abraham, Ajith
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open...ain/vavai/riv/wos
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |