Topic modelling of authentication events in an enterprise computer network

File Description SizeFormat 
topic_modelling.pdfAccepted version542.93 kBAdobe PDFView/Open
Title: Topic modelling of authentication events in an enterprise computer network
Authors: Heard, NA
Palla, K
Skoularidou, M
Item Type: Conference Paper
Abstract: The possibility for theft or misuse of legitimate user credentials is a potential cyber-security weakness in any enterprise computer network which is almost impossible to eradicate. However, by monitoring the network traffic patterns, it can be possible to detect misuse of credentials. This article presents an initial investigation into deconvolving the mixture behaviour of several individuals within a network, to see if individual users can be identified. Towards that, a technique used for document classification is deployed, the Latent Dirichlet allocation model. A pilot study is conducted on authentication events taken from real data from the enterprise network of Los Alamos National Laboratory.
Issue Date: 17-Nov-2016
Date of Acceptance: 21-Jul-2016
URI: http://hdl.handle.net/10044/1/42760
DOI: https://dx.doi.org/10.1109/ISI.2016.7745466
ISBN: 978-1-5090-3865-7
Publisher: IEEE
Copyright Statement: © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Conference Name: IEEE Conference on Intelligence and Security Informatics (ISI), 2016
Publication Status: Published
Start Date: 2016-09-28
Finish Date: 2016-09-30
Conference Place: Arizona, USA
Appears in Collections:Mathematics
Statistics
Faculty of Natural Sciences



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Creative Commonsx