Sun Xiaoshuang, Wang Yu. REVIEW OF INSIDER THREAT DETECTION TECHNIQUES BASED ON MULTI-SOURCE DATA[J]. Computer Applications and Software, 2024, 41(9): 1-8,40. DOI: 10.3969/j.issn.1000-386x.2024.09.001
Citation: Sun Xiaoshuang, Wang Yu. REVIEW OF INSIDER THREAT DETECTION TECHNIQUES BASED ON MULTI-SOURCE DATA[J]. Computer Applications and Software, 2024, 41(9): 1-8,40. DOI: 10.3969/j.issn.1000-386x.2024.09.001

REVIEW OF INSIDER THREAT DETECTION TECHNIQUES BASED ON MULTI-SOURCE DATA

  • In recent years, insider threat incidents are on the rise, insider network security is facing great challenges, insider threat detection technology begins to be widely concerned and is studied as an effective means. This paper analyzes and summarizes the development of insider threat detection technology from the perspective of data sources, and compares the characteristics of data from different sources, the roles played in the detection and the detection methods for this type of data. On this basis, the paper introduced the widely studied insider threat dataset CERT-IT, and analyzed and compared the insider threat detection methods based on CERT-IT, so as to discuss the challenges faced by the current insider threat detection technology and the future development trend.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return