Abstract
Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact. For the implementation of the experimental stage described in this study, the Convolutional Neural Network (from now on CNN) algorithm was used and implemented via the Google Tensorflow program, which was trained to identify potential threats from images produced by the available dataset. From the examination of the images that were produced and with the help of Machine Learning, the question whether the activity of each user is classified as 'malicious' or not for the Information System was answered.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2020 IEEE Conference on Network Softwarization |
Subtitle of host publication | Bridging the Gap Between AI and Network Softwarization, NetSoft 2020 |
Editors | Filip De Turck, Prosper Chemouil, Tim Wauters, Mohamed Faten Zhani, Walter Cerroni, Rafael Pasquini, Zuqing Zhu |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 437-443 |
Number of pages | 7 |
ISBN (Electronic) | 978-1-7281-5684-2 |
ISBN (Print) | 978-1-7281-5685-9 |
DOIs | |
Publication status | Published - 12 Aug 2020 |
Event | 6th IEEE Conference on Network Softwarization - Online, Belgium Duration: 29 Jun 2020 → 3 Jul 2020 |
Conference
Conference | 6th IEEE Conference on Network Softwarization |
---|---|
Abbreviated title | NetSoft 2020 |
Country/Territory | Belgium |
Period | 29/06/20 → 3/07/20 |
Keywords
- Artificial intelligence
- Machine learning
- Security
- Threats
- Visualization