Insider Threat Detection Based on Adaptive Optimization by Grid Search

被引:0
|
作者
Zhang, Jiange [1 ]
Chen, Yue [1 ]
Yang, Kuiwu [1 ]
Zhao, Jian [1 ]
Yan, Xincheng [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
grid search; adaptive optimization; learning rate; network structure; deep belief net; insider threat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the problem that one-dimensional parameter optimization in insider threat detection using deep learning will lead to unsatisfactory overall performance of the model, an insider threat detection method based on adaptive optimization DBN by grid search is designed. This method adaptively optimizes the learning rate and the network structure which form the two-dimensional grid, and adaptively selects a set of optimization parameters for threat detection, which optimizes the overall performance of the deep learning model. The experimental results show that the method has good adaptability. The learning rate of the deep belief net is optimized to 0.6, the network structure is optimized to 6 layers, and the threat detection rate is increased to 98.794%. The training efficiency and the threat detection rate of the deep belief net are improved.
引用
收藏
页码:173 / 175
页数:3
相关论文
共 50 条
  • [1] Insider threat detection of adaptive optimization DBN for behavior logs
    Zhang, Jiange
    Chen, Yue
    Ju, Ankang
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2018, 26 (02) : 792 - 802
  • [2] BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid
    Bao, Haiyong
    Lu, Rongxing
    Li, Beibei
    Deng, Ruilong
    IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02): : 190 - 205
  • [3] An Effective Insider Threat Detection Apporoach Based on BPNN
    Tao, Xiaoling
    Liu, Runrong
    Fu, Lianyou
    Qiu, Qiqi
    Yu, Yuelin
    Zhang, Haijing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 231 - 243
  • [4] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [5] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [6] Machine learning based Insider Threat Modelling and Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019,
  • [7] Unsupervised Ensemble based Learning for Insider Threat Detection
    Parveen, Pallabi
    McDaniel, Nate
    Hariharan, Varun S.
    Thuraisingham, Bhavani
    Khan, Latifur
    PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 718 - 727
  • [8] Insider threat detection for specific threat scenarios
    Tian Tian
    Chen Zhang
    Bo Jiang
    Huamin Feng
    Zhigang Lu
    Cybersecurity, 8 (1)
  • [9] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [10] Research on insider threat detection method based on variational autoencoding
    Zhang, Zhenjiang
    Zhao, Lulu
    Zhang, Yang
    Zhou, Hongde
    Li, Wei
    Journal of Computers (Taiwan), 2021, 32 (04) : 201 - 210