Computer Science and Information Technologies, Computer Science and Information Technologies 2006

Font Size: 
Adaptive Profile Approach to Internal Attack Detection
V. I. Vasilyev, T. R. Kashayev

Last modified: 2020-12-26


The rapid growing of number of internal attacks leads to the new security tools development. This paper describes the new approach to internal attack detection using adaptive users' profiles. Methods discussed here can improve the quality of attack detection and overall system performance


Adaptive Profile Approach; Internal Attack Detection; security tools development


1. "2005 Global Security Survey". Deloitte & Touche Company, 2005.

2. Hartigan J.A. "Clustering Algorithms". John Wiley & Sons Inc., New York, USA, 1975.

3. Zadeh L.A., Kacprzyk J. "Fuzzy Logic for the Management of Uncertainty". John Wiley & Sons Inc., New York, USA, 1992.

Full Text: PDF