Skip to main content

Showing 1–4 of 4 results for author: Sajjanhar, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.02855  [pdf, other

    cs.CR cs.AI cs.LG

    Hybrid Deep Learning Model using SPCAGAN Augmentation for Insider Threat Analysis

    Authors: R G Gayathri, Atul Sajjanhar, Yong Xiang

    Abstract: Cyberattacks from within an organization's trusted entities are known as insider threats. Anomaly detection using deep learning requires comprehensive data, but insider threat data is not readily available due to confidentiality concerns of organizations. Therefore, there arises demand to generate synthetic data to explore enhanced approaches for threat analysis. We propose a linear manifold learn… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: 14 pages, 8 figures

  2. arXiv:2102.07277  [pdf, other

    cs.CR cs.AI cs.NE

    Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data

    Authors: R G Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma

    Abstract: Insider threats are the cyber attacks from within the trusted entities of an organization. Lack of real-world data and issue of data imbalance leave insider threat analysis an understudied research area. To mitigate the effect of skewed class distribution and prove the potential of multinomial classification algorithms for insider threat detection, we propose an approach that combines generative m… ▽ More

    Submitted 8 July, 2021; v1 submitted 14 February, 2021; originally announced February 2021.

    Comments: 8 pages, 4 figures

  3. arXiv:1911.05879  [pdf, other

    cs.CR cs.CV cs.LG

    Image-Based Feature Representation for Insider Threat Classification

    Authors: Gayathri R G, Atul Sajjanhar, Yong Xiang

    Abstract: Insiders are the trusted entities in the organization, but poses threat to the with access to sensitive information network and resources. The insider threat detection is a well studied problem in security analytics. Identifying the features from data sources and using them with the right data analytics algorithms makes various kinds of threat analysis possible. The insider threat analysis is main… ▽ More

    Submitted 12 November, 2019; originally announced November 2019.

    Comments: 8 pages, 5 figures

    Journal ref: Applied Sciences, vol. 10, no. 14, p. 4945, 2020

  4. arXiv:1810.09078  [pdf

    cs.SD cs.LG eess.AS stat.ML

    Our Practice Of Using Machine Learning To Recognize Species By Voice

    Authors: Siddhardha Balemarthy, Atul Sajjanhar, James Xi Zheng

    Abstract: As the technology is advancing, audio recognition in machine learning is improved as well. Research in audio recognition has traditionally focused on speech. Living creatures (especially the small ones) are part of the whole ecosystem, monitoring as well as maintaining them are important tasks. Species such as animals and birds are tending to change their activities as well as their habitats due t… ▽ More

    Submitted 22 October, 2018; originally announced October 2018.

    Comments: 16 pages