Loading

Insider threats and Insider Intrusion Detection
Lekshmipriya S B1, G Geetha2

1Lekshmipriya S B, Research Scholar, Department of Computer Science and Engineering, Jerusalem College of Engineering, Anna University, Chennai (Tamil Nadu), India.
2Dr. G Geetha, Professor, Department of Computer Science and Engineering, Jerusalem College of Engineering, Anna University, Chennai (Tamil Nadu), India.
Manuscript received on 15 July 2019 | Revised Manuscript received on 11 August 2019 | Manuscript Published on 29 August 2019 | PP: 158-166 | Volume-8 Issue-2S5 July 2019 | Retrieval Number: B10330682S519/2019©BEIESP | DOI: 10.35940/ijrte.B1033.0782S519
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This survey paper narrates insider threats and their detection types and methods. Insider threats are emerging nowadays, it is important to identify these threats as they are generating critical problems to the system. This paper pays particular attention to the categories of threats and different types of detection methods. Based on different strategies, statistical and machine learning methods for detecting these threats, are identified and summarized here.
Keywords: Security, Insider Threats, IDS.
Scope of the Article: Security, Privacy and Trust in IoT & IoE