Main Reference PaperScenario-Based Insider Threat Detection From Cyber Activities, IEEE transactions on computational social systems, 2018.[Python]
  • The proposed insider threat detection model exploits the activity-log of human behavior characteristics to discover the anomalies. It employs the deep autoencoder neural network with the two-layered structure to classify the insider threat data based on the knowledge of ground truth.

Description
  • The proposed insider threat detection model exploits the activity-log of human behavior characteristics to discover the anomalies. It employs the deep autoencoder neural network with the two-layered structure to classify the insider threat data based on the knowledge of ground truth.

  • To develop a data detection model for insider threat

  • To identify the anomalousness in user behavior across the time

Aim & Objectives
  • To develop a data detection model for insider threat

  • To identify the anomalousness in user behavior across the time

  • To develop the model with the increased number of hidden layers in the deep autoencoder neural network will enhance the performance of the classification.

Contribution
  • To develop the model with the increased number of hidden layers in the deep autoencoder neural network will enhance the performance of the classification.

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit