Professional Documents
Culture Documents
Protection and Prevention Aganist "Insider",The Mostly Cost Type of Attack
Protection and Prevention Aganist "Insider",The Mostly Cost Type of Attack
REFERENCES
[1]Fang-Yie Leu, Kun-Lin Tsai, Member, IEEE, Yi-Ting Hsiao, and Chao-
Tung Yang , “An Internal Intrusion Detection and Protection System
by Using Data Mining and Forensic Techniques,”IEEE SYSTEMS
JOURNAL, 2015.
[2]Santosh Aditham and Nagarajan Ranganathan, “A System Architecture
for the Detection of Insider Attacks in Big Data Systems ,” IEEE
Transactions on Dependable and Secure Computing, 2017.
[3]Loukas Lazos and Marwan Krunz, ” Selective Jamming/Dropping In-
sider Attacks in Wireless Mesh Networks,”Scopus Indexed
Journal,2011.
[4]Nathalie Baracaldo, Balaji Palanisamy, and James Joshi, “G-SIR: An
Insider Attack Resilient Geo-Social Access Control Framework ,”IEEE
Transactions on Dependable and Secure Computing, 2017.
[5]Baraq Ghaleb, Ahmed Al-Dubai, IEEE, Elias Ekonomou , Mamoun
Qasem, Imed Romdhani , and Lewis Mackenzie, “Addressing the DAO
Insider Attack in RPL’s Internet of Thing,” IEEE COMMUNICATIONS
LETTERS, VOL. 23, NO. 1, JANUARY 2019.
[6]Sang-Yoon Chang, Member, IEEE, and Yih-Chun Hu, Member, IEEE,
“SecureMAC: Securing Wireless Medium Access Control Against In-
sider Denial-of-Service Attacks,” IEEE Transactions on Mobile Com-
puting ,2016.
[7]Saraswathi Shunmuganathan a,* , Renuka Devi Saravanan b , Yogesh
Palanichamy c , “Securing VPN from insider and outsider bandwidth
flooding attack ,” Elsevier journal , 2020.
[8]Nebrase Elmrabit a, , Shuang-Hua Yang b , Lili Yangc , Huiyu Zhou,
“ Insider Threat Risk Prediction based on Bayesian Network,” Elsevier
Journal on Computers and Security, 2020.
[9]Nader Sohrabi Safaa,b, , Carsten Maplea , Tim Watsona , Rossouw Von
Solms, “ Motivation and opportunity based model to reduce information
security insider threats in organisations,” Journal of Information
Security and Applications , 2017.
[10]Junhong Kim, Minsik Park, Haedong Kim, Suhyoun Cho and Pilsung
Kang , “ Insider Threat Detection Based on User Behavior Modeling
and Anomaly Detection Algorithms ,” Appl. Sci., 2019.