Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Front Bioeng Biotechnol ; 11: 1211143, 2023.
Article in English | MEDLINE | ID: mdl-37397968

ABSTRACT

Purpose: In the contemporary era, a significant number of individuals encounter various health issues, including digestive system ailments, even during their advanced years. The major purpose of this study is based on certain observations that are made in internal digestive systems in order to prevent severe cause that usually occurs in elderly people. Approach: To solve the purpose of the proposed method the proposed system is introduced with advanced features and parametric monitoring system that are based on wireless sensor setups. The parametric monitoring system is integrated with neural network where certain control actions are taken to prevent gastrointestinal activities at reduced data loss. Results: The outcome of the combined process is examined based on four different cases that is designed based on analytical model where control parameters and weight establishments are also determined. As the internal digestive system is monitored the data loss that is present with wireless sensor network must be reduced and proposed approach prevents such data loss with an optimized value of 1.39%. Conclusion: Parametric cases were conducted to evaluate the efficacy of neural networks. The findings indicate a significantly higher effectiveness rate of approximately 68% when compared to the control cases.

2.
PeerJ Comput Sci ; 8: e938, 2022.
Article in English | MEDLINE | ID: mdl-35494800

ABSTRACT

With the wide use of technologies nowadays, various security issues have emerged. Public and private sectors are both spending a large portion of their budget to protect the confidentiality, integrity, and availability of their data from possible attacks. Among these attacks are insider attacks which are more serious than external attacks, as insiders are authorized users who have legitimate access to sensitive assets of an organization. As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats. This article reviews different techniques and countermeasures that are proposed to prevent insider attacks. A unified classification model is proposed to classify the insider threat prevention approaches into two categories (biometric-based and asset-based metric). The biometric-based category is also classified into (physiological, behavioral and physical), while the asset metric-based category is also classified into (host, network and combined). This classification systematizes the reviewed approaches that are validated with empirical results utilizing the grounded theory method for rigorous literature review. Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature domains, classification algorithms, evaluation metrics, real-world simulation, stability and scalability, etc.). Major challenges are also highlighted which need to be considered when deploying real-world insider threat prevention systems. Some research gaps and recommendations are also presented for future research directions.

3.
Entropy (Basel) ; 23(10)2021 Sep 27.
Article in English | MEDLINE | ID: mdl-34681982

ABSTRACT

Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks. Most existing approaches in the field of insider threat focused on detecting general insider attack scenarios. However, insider attacks can be carried out in different ways, and the most dangerous one is a data leakage attack that can be executed by a malicious insider before his/her leaving an organization. This paper proposes a machine learning-based model for detecting such serious insider threat incidents. The proposed model addresses the possible bias of detection results that can occur due to an inappropriate encoding process by employing the feature scaling and one-hot encoding techniques. Furthermore, the imbalance issue of the utilized dataset is also addressed utilizing the synthetic minority oversampling technique (SMOTE). Well known machine learning algorithms are employed to detect the most accurate classifier that can detect data leakage events executed by malicious insiders during the sensitive period before they leave an organization. We provide a proof of concept for our model by applying it on CMU-CERT Insider Threat Dataset and comparing its performance with the ground truth. The experimental results show that our model detects insider data leakage events with an AUC-ROC value of 0.99, outperforming the existing approaches that are validated on the same dataset. The proposed model provides effective methods to address possible bias and class imbalance issues for the aim of devising an effective insider data leakage detection system.

SELECTION OF CITATIONS
SEARCH DETAIL
...