A system and method for insider threat detection based on embedded learning of heterogeneous temporal events
A threat detection and event technology, applied in the field of information security, can solve problems such as dependence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0078] In order to better understand the present invention, some basic concepts are firstly explained.
[0079] Heterogeneous timing events: Each event generated by the five behaviors of the user's host login, file access, email communication, web browsing, and mobile device connection is a heterogeneous timing event. That is, heterogeneous time series events include user host login events, file access events, email communication events, web browsing events, and mobile device connection events.
[0080] Entities of heterogeneous timing events: each heterogeneous timing event includes four entities: time, user name, host number, and operation.
[0081] Heterogeneous timing event sequence: A collection of multiple heterogeneous timing events in chronological order within a fixed time interval.
[0082] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.
[0083] Such as figure 1 As shown, the present invention...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


