Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment

被引:6
作者
Bin Ahmad, Maaz [1 ]
Akram, Adeel [2 ]
Asif, M. [3 ]
Ur-Rehman, Saeed [1 ]
机构
[1] Ctr Adv Studies Engn, Dept Elect & Comp Engn, Islamabad, Pakistan
[2] Univ Engn & Technol, Fac Software & Comp Engn, Taxila, Pakistan
[3] Muhammad Ali Jinnah Univ, Dept Elect Engn, Islamabad, Pakistan
关键词
FUZZY; CONTROLLERS; FRAMEWORK; SECURITY; MODEL;
D O I
10.1155/2014/179109
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Insider threats detection problem has always been one of the most difficult challenges for organizations and research community. Effective behavioral categorization of users plays a vital role for the success of any detection mechanisms. It also helps to reduce false alarms in case of insider threats. In order to achieve this, a fuzzy classifier has been implemented along with genetic algorithm (GA) to enhance the efficiency of a fuzzy classifier. It also enhances the functionality of all other modules to achieve better results in terms of false alarms. A scenario driven approach along with mathematical evaluation verifies the effectiveness of the modified framework. It has been tested for the enterprises having critical nature of business. Other organizations can adopt it in accordance with their specific nature of business, need, and operational processes. The results prove that accurate classification and detection of users were achieved by adopting the modified framework which in turn minimizes false alarms.
引用
收藏
页数:12
相关论文
共 33 条
[1]  
[Anonymous], 2008, The national infrastructure advisory council's final report and recommendations on the insider threat to critical infrastructures
[2]  
[Anonymous], 2013, INT SCI C ASS
[3]   Genetic algorithm for the design of a class of fuzzy controllers: An alternative approach [J].
Belarbi, K ;
Titel, F .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2000, 8 (04) :398-405
[4]  
Bell D. E., 1973, SECURE COMPUTER SYST
[5]  
Bell K., 1976, MTR22997 MITRE CORP
[6]  
Biba K. J, 1977, MTR3153 MITRE
[7]   Multidimensional statistical analysis of the parameterization of a genetic algorithm for the optimal ordering of tables [J].
Bielza, C. ;
Fernandez del Pozo, J. A. ;
Larranaga, P. ;
Bengoetxea, E. .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) :804-815
[8]  
Bishop M., 2008, COUNTERING INSIDER T
[9]  
Blackwell C., 2009, P 5 ANN CYB SEC INF
[10]  
Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295