Abstract

Applying artificial intelligence for insider threat detection faced a number of challenges: lack of data, user behavior modeling, etc. Meanwhile, there are open datasets for research and there are effective approaches of insider threat detection. This work considers studies that utilizes one of the popular datasets — CERT. A comparative analysis contains features used for user behavior modeling and insider threat detection methods.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call