Show simple item record

dc.contributor.authorKoutsouvelis, V
dc.contributor.authorShiaeles, S
dc.contributor.authorGhita, B
dc.contributor.authorBendiab, G
dc.contributor.editorTurck FD
dc.contributor.editorChemouil P
dc.contributor.editorWauters T
dc.contributor.editorZhani MF
dc.contributor.editorCerroni W
dc.contributor.editorPasquini R
dc.contributor.editorZhu Z
dc.date.accessioned2021-05-18T11:51:12Z
dc.date.available2021-05-18T11:51:12Z
dc.date.issued2020-06
dc.identifier.isbn9781728156842
dc.identifier.urihttp://hdl.handle.net/10026.1/17133
dc.description.abstract

Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact. For the implementation of the experimental stage described in this study, the Convolutional Neural Network (from now on CNN) algorithm was used and implemented via the Google Tensorflow program, which was trained to identify potential threats from images produced by the available dataset. From the examination of the images that were produced and with the help of Machine Learning, the question whether the activity of each user is classified as 'malicious' or not for the Information System was answered.

dc.format.extent437-443
dc.language.isoen
dc.publisherIEEE
dc.subjectThreats
dc.subjectvisualization
dc.subjectsecurity
dc.subjectartificial intelligence
dc.subjectmachine learning
dc.titleDetection of Insider Threats using Artificial Intelligence and Visualisation
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000623436400070&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2020-06-29
plymouth.date-finish2020-07-03
plymouth.volume00
plymouth.publisher-urlhttps://ieeexplore.ieee.org/xpl/conhome/9158198/proceeding
plymouth.conference-name2020 6th IEEE International Conference on Network Softwarization (NetSoft)
plymouth.publication-statusPublished
plymouth.journal2020 6th IEEE Conference on Network Softwarization (NetSoft)
dc.identifier.doi10.1109/netsoft48620.2020.9165337
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/netsoft48620.2020.9165337
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV