Paper
5 July 2024 An optimization method for enterprise user anomaly detection based on FCM
Yifei Huang, Xin Li, Chengming Zou
Author Affiliations +
Proceedings Volume 13184, Third International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024); 1318468 (2024) https://doi.org/10.1117/12.3032958
Event: 3rd International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024), 2024, Kuala Lumpur, Malaysia
Abstract
As businesses continue to expand and digitize, there is a surge in both internal and load data. However, internal data, which is one of the core assets of a company, is increasingly under severe security threats. More covert attacks characterized by long cycles, low frequency, and high stealth are bypassing traditional security detection methods, causing extensive damage to data. To address this, we propose an approach that integrates various types of data reflecting the baseline of user behavior, based on the correlation of users, entities, and behaviors. We extract several fundamental features that most effectively indicate user anomalies and combine the XGBoost feature selection strategy with the FCM clustering algorithm. By scoring anomalies, we can identify the users posing the highest risk of anomalies. The results demonstrate that the newly proposed anomaly detection algorithm achieves an accuracy rate of over 83.5% and a recall rate of over 86.7%.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yifei Huang, Xin Li, and Chengming Zou "An optimization method for enterprise user anomaly detection based on FCM", Proc. SPIE 13184, Third International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024), 1318468 (5 July 2024); https://doi.org/10.1117/12.3032958
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Feature selection

Feature extraction

Particles

Data modeling

Detection and tracking algorithms

Particle swarm optimization

Video

Back to Top