Key points are not available for this paper at this time.
Insider threats, in which someone within an organization poses a risk, are widely regarded as the most dangerous in cybersecurity. Many analysts are working hard to identify and prevent these risks. However, the most difficult aspect of cybersecurity is determining which computers and users are affected. These computers are connected to servers or monitored by them, but there are no clear indications that attackers are targeting specific users. It is critical for the organization to defend against both internal and external cyberattacks. Cyber security measures should be up to date is critical for protecting our organizations. External threats can be identified easily but to identify insider threats is a complex task. Recently, there has been an increased emphasis on computer security, particularly in developing internal risk detection systems. Artificial intelligence, Internet of Things, distributed computing, data mining, portable ledgers, and data discovery are some of the advanced methods that have gained popularity for mitigating insider risk. Each of these approaches is unique and takes insider threats into account to a varying degree. In this paper, we use different machine learning models to find out the insiders.
Building similarity graph...
Analyzing shared references across papers
Loading...
Nitin Dixit
Rishi Gupta
Pradeep Yadav
Manipal Academy of Higher Education
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
Building similarity graph...
Analyzing shared references across papers
Loading...
Dixit et al. (Wed,) studied this question.
www.synapsesocial.com/papers/68e785a8b6db6435876f8375 — DOI: https://doi.org/10.1109/iciptm59628.2024.10563542