Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.2.321

A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC  

Ahn, Jong-seong (Graduate School of Information Security, Korea University)
Lee, Kyung-ho (Graduate School of Information Security, Korea University)
Abstract
Prevention of corporate confidentiality leakage by insiders in enterprises is an essential task for the survival of enterprises. In order to prevent information leakage by insiders, companies have adopted security solutions, but there is a limit to effectively detect abnormal behavior of insiders with access privileges. In this study, we use the Unsupervised Learning algorithm of the machine learning technique to effectively and efficiently cluster the normal and abnormal access logs of the worker's work screen in the manufacturing information system, which includes the company's product manufacturing history and quality information. We propose an optimal feature selection model for anomaly detection by studying clustering methods.
Keywords
Machine Learning; Anomaly Detection; Feature Selection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Small and Medium Business Administration, "2016 Technical statistics survey report for small and Medium businesses", 2016.
2 Vormetric, "Insider threat Repoert", 2015
3 Hyun-Song Jang, "Data-mining Based Anomaly Detection in Document Management System", ISSN 1975-7700, 2015
4 Young-baek Kwon, In-seok Kim, "A Study on Anomaly Signal Detection and Management Model Uing Big Data", JIIBC, Vol.16, No. 6, pp.287-294, Dec. 2016   DOI
5 Haedong Kim, "Insider Threat Detection based on User Behavior Model and Novelty Detection Algorithms", Korea University, 2017
6 Ho Jin Lee "Feature Selection Practice for Unsupervised Learning of Credit Card Fraud Detection", Korea University, Feb. 2017.
7 Pallabi Parveen, Nate McDanial, Varun S. Hariharan, "Unsupervised Ensemble based Learning for Insider Threat Detection", IEEE 2012.
8 Eldardiry, H., Sricharn,k.,Liu, j., Hanley,J., Price,B., Brdiczka, O., & Bart,E(2014). "Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 5(2),39-58
9 Tae-ho Kim, "Feature Selection Optimization in Unsupervised Learning for Insider threat Detection", Korea University, 2018
10 Youn-Im Choi, "A Study on Improvement of K-means Clustering With Bisecting", Chung-Ang University, Aug. 2011
11 Martin Ester, Hans-Peter Kriegel, Jorg Sander, Xiaowei Xu, "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise", Proceedings of the Second International Conference on Knowledge Discovery and Data Mining(KDD-96), AAAI Press. pp. 226-231, 1996