<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>XVI All-Ukrainian scientific and practical conference of students, postgraduates
and young scientists</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Improving the method of detecting insider attacks on the organization's information resources</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vitalii Savchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valeriia Savchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Vozniak</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Sampir</string-name>
          <email>Sampir1984@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>Solomianska street, 7, 03110, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>The National Defence University of Ukraine</institution>
          ,
          <addr-line>Air Force avenue, 28, Kyiv, 03049</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1921</year>
      </pub-date>
      <volume>26</volume>
      <issue>27</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article deals with the problem of detecting insider attacks on the organization's information resources. This article is a continuation of the authors' publication, which proposed a method for detecting malicious activity based on the statistical measure IDF (Inverse Document Frequency) and calculating the cosine similarity of two vector assets. The authors show that this similarity-based approach works well in organizations where employees' access rights to the organization's information resources do not overlap. However, in the case of using shared resources or masking the activity of an insider, this approach is not very effective. The authors of the article propose an improved method, the difference of which is the presence of two matrices: the matrix of permissions and the matrix of real access. The difference of such matrices expressed as a percentage of the user's total access to information assets makes it possible to calculate a measure of the user's malicious activity. Input data for the technique is information from IDS intrusion detection systems. The simulation results based on the given examples show that the improved method is more adequate compared to the cosine similarity method, which makes it possible to use it in a wide range of applications. The method allows you to determine the abnormal activity of users in the organization, which makes it possible to detect insider attacks at an early stage. The method can be used by information security administrators for further analysis of user activity.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;information asset</kwd>
        <kwd>information resource</kwd>
        <kwd>insider</kwd>
        <kwd>abnormal user behavior</kwd>
        <kwd>cosine similarity 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>information systems of organizations by identifying and solving anomalies in their interaction with
users.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement</title>
      <p>The general problem of identifying anomalies in the interaction of users with the organization's
information resources is that this task is complex and requires an integrated approach due to several
key reasons:
•
•
•
•
•
•</p>
      <p>Variety of Anomalies: Anomalous user behavior can take many forms, including unusual
patterns of information access, unusual activity, unauthorized access attempts, or insider
threats. The diversity of these anomalies makes their detection difficult.</p>
      <p>Volume of data: Organizations have huge volumes of data generated as a result of user
interaction with information systems. Analyzing these large volumes of data to detect
anomalies requires powerful processing and analysis tools.</p>
      <p>Dynamics of change: User behavior and the structure of information systems can change
over time. What was normal yesterday may become an anomaly today. You need a system
that can adapt to changes in the environment.</p>
      <p>Data heterogeneity: User interaction data can be presented in different formats and sources.
Combining them and processing them to detect anomalies can be difficult due to differences
in data structures and types.</p>
      <p>Need for accuracy: Anomaly detection requires high accuracy because misinterpretation can
lead to misclassification of normal behavior as abnormal or vice versa.</p>
      <p>Ensuring privacy: When detecting anomalies, the confidentiality and privacy of user data
must be preserved, which can make it difficult to implement some analysis methods.</p>
      <p>Since these problems are complex and diverse, the detection of anomalies in the interaction of
users with information resources requires the use of various methods of data analysis, machine
learning, and the development of specialized systems to effectively solve this problem.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Related works overview</title>
      <p>Anomaly detection is a direction that is becoming more and more relevant every year. There are
various ways of detecting anomalies in the activity of information system users. Most of them are
based on the analysis of various technical indicators, such as network activity, use of peripheral
devices, system load, intensity of interaction with information systems, etc.</p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], we investigated the intrusion detection method based on the calculation of the
similarity of user actions. The disadvantage of the previous study is that, despite its advantages, the
proposed method is poorly protected against deception by unscrupulous users, as it is based on the
calculation of the similarity coefficient of the user's actions using cosine similarity. This approach
allows the attacker to easily imitate loyal activity, thereby leveling off his malicious activity. Our
other paper [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] investigates the detection of insider attacks based on the time parameters of the
protection system. In this publication, we conclude that detection of such an attack is possible only
when the defense system is able to react faster than the attacker.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] provides a comprehensive review of the existing literature, which examines recent
advances in anomaly detection methods for detecting security threats in cyber-physical systems. The
authors analyze 296 articles devoted to the detection of anomalies and identify the shortcomings of
various detection methods, including: limited resources, lack of standardized communication
protocols, heterogeneity of technologies and protection systems, different information security
policies. The authors of the article [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] propose approaches to the classification of anomaly detection
methods in modern attack detection systems. It is shown that the methods of detecting anomalies in
modern attack detection systems are not sufficiently elaborated in terms of the formal attack model,
and, therefore, it is quite difficult for them to strictly evaluate such properties as computational
complexity, correctness, and completeness.
      </p>
      <p>The authors of the publication [5] evaluate anomaly detection methods based on the aspect of
their applicability to various systems with the minimization of the user input. The obtained results
show that the most effective method of detecting anomalies, which can be transferred to different
systems and minimizes the user's work, are systems based on machine learning. The publication [6]
defines three main methodological areas for diagnosing anomalies (machine learning, deep learning,
statistical approaches) and summarizes exactly how the corresponding models are used to detect
anomalies. In addition, the authors explain which specific application areas are typically addressed
by anomaly detection in the context of cloud computing environments and which relevant public
datasets are often used for evaluation.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5">7</xref>
        ], the authors propose an intelligent system for detecting anomalies and identifying smart
home devices using collective communication. The concept of the system's operation is based on
obtaining benefits from the integration of smart homes into a social network in terms of increasing
the security of both a single smart home and the entire social network of connected smart homes.
Publication [
        <xref ref-type="bibr" rid="ref6">8</xref>
        ] proposes an unsupervised method that was developed to detect anomalies when
information is not labeled or classified. Information extraction approaches based on machine
learning, developed for the implementation of the anomaly detection system, were used.
implemented in the practice of organizations. Their work is based on the use of a database of attack
patterns (signatures) and machine learning methods. In addition, such systems can register a set of
data characterizing the interaction of employees with the organization's information assets and have
proven themselves well in solving the problem of detecting anomalies.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref7">9</xref>
        ] describes a study of log mining in the field of microservices technologies with the
detection of anomalies from logs, that is, events that require deeper inspection by analysts. The
authors propose a new approach to finding numerical representations of computer logs without
making assumptions about the format of the underlying data and without requiring programming
knowledge. The article [
        <xref ref-type="bibr" rid="ref8">10</xref>
        ] presents a distributed approach for real-time anomaly detection in
largescale environments. The method has the ability to detect consistent and quantitative anomalies
within a multi-source streaming log.
      </p>
      <p>The purpose of this article is to improve the previously proposed method of detecting
anomalies of user interaction with the organization's information resources, which would allow
using the results of modern intrusion detection systems (IDS) and would be simple enough for
practical implementation by information security administrators.
4. The method of detecting insider attacks on the organization's
information resources</p>
      <sec id="sec-3-1">
        <title>4.1. General approach</title>
        <p>
          As before, we will take as a basis the methodology based on the use of a bipartite graph [
          <xref ref-type="bibr" rid="ref1">1, 11</xref>
          ] to
display the interaction of users (employees of the organization) with assets (information systems) on
the basis of network data collected by the IDS system.
        </p>
        <p>The set of users will be denoted by  = { 1, … ,   }, the information assets will be defined as the
set  = { 1, … ,   }, and the set of users who accessed to assets   over a certain period of time will
be defined as the set    . We denote as       , where the value of the weight
between pairs of vertices is the value of similarity.</p>
        <p>A bipartite graph reflecting the fact of users' access to assets is denoted by a binary matrix   . At
the same time   ( ,  ) = 1, if the user   accesses the   asset, and   ( ,  ) = 0 if not. It is suggested
181
to use the statistical measure IDF (Inverse Document Frequency) to assess the connection of users
with assets. As a measure of IDF   , it is suggested to take a sigmoidal function in the form:

 (  ) =
where  = (1,1, … ,1) is unit vector of dimension  ; | | is a power of set  ;   is a column  -user
of the matrix   (access vector);  is a sensitivity coefficient of the function.</p>
        <p>The matrix obtained after the transformation will be denoted by  
 . The similarity between pairs
of users can be obtained based on their access vectors. To measure the similarity of two vector assets,
it is suggested to use cosine similarity [12]:
 (  ,   ) = ‖ 

 (  )×  (  )
(  )‖×‖ 
(  )‖
=</p>
        <p>∑ =1  
(  , )×</p>
        <p>(  , )
√∑ =1(</p>
        <p>2
(  , )) ×√∑ =1( 
(  , ))
2</p>
        <p>
          Given two feature vectors  and  , the cosine similarity can be represented using the scalar
product and the norm. When a user interacts with an organization's information assets, the cosine
similarity of two users ranges from 0 to 1, since the angle between the two frequency vectors cannot
be greater than 90°. Cosine similarity is effective as an evaluation measure, especially for sparse
vectors, since only non-zero values are taken into account [
          <xref ref-type="bibr" rid="ref8">10</xref>
          ].
        </p>
        <p>As a result of the calculations, a similarity matrix of user interaction with information assets will
be obtained. It is assumed that if one of the users is an intruder, then his actions will be reflected in
the similarity matrix. Around each asset, an individual group of users is formed who work with it
and refer to it. To calculate the similarity between groups of users, it is necessary to calculate the
average similarity between all pairs of users (total user similarity):
|   |×</p>
        <p>2</p>
        <p>(   ) = ∑ =1 ∑ =1  (  ,  ) , ∀  ≠   ∈   
−1
∀  ,
where |   | is number of users in the group.</p>
        <sec id="sec-3-1-1">
          <title>Building sets of users and assets.</title>
          <p>Construction of a bipartite interaction graph.
Calculation of the statistical measure of IDF.
Calculation of the similarity matrix of user actions.
Calculation of the overall similarity of user actions.</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Detection of abnormal actions.</title>
          <p>If  (   ) has a high value, it means that users have a strong engagement with asset   . To detect
anomalous user actions, it is necessary to determine the average similarity for the subgroup
 (   ), ∀ ∨  =  , in which a single user  is compared with other users, and to determine the
rating of this user relative to the average value for the organization:
the more likely that user   's access to assets   is abnormal.</p>
          <p>The proposed technique for detecting abnormal user actions based on network data analysis can
be presented in the form of a sequence of steps:
(1)
(2)
(3)
(4)
4.2. Algorithm for detecting anomalies in the interaction of users with the
organization's information assets (Algorithm of similarity)
  1,1
   ,1</p>
          <p>1,
⋯
⋱
⋯    ,
1.   ← [ ⋮
2.  ←
3.</p>
          <p>= 
4.  = 
5.  ← (1, … , 1 )
6.</p>
          <p>( ) = 
7. 
 (  ) = 
ℎ[  ]
ℎ[   ]
[</p>
          <p>−
the matrix of sigmoidal functions.
8.  (  ,   ) = 
9.  (   ) = 
10.  (   ) =</p>
          <p>actions.
11.  (  ,  ) = 
individual users.
similarity matrix for user actions.
actions of individual users.</p>
          <p>1</p>
          <p>∑ =1  (   )
⋮ ] forming a matrix of user access to assets.
[   , = 1,   ( ) , 0] , { ,  }, { ,  }]</p>
          <p>∑ =1   (  ) , ×  (  ) ,
√∑ =1(  (  ) , )2×√∑ =1(  (  ) , )
2</p>
          <p>, { ,  }, { ,  }]
⋮ ]. The elements of this matrix denote:   ( ,  ) = 1, if the user   is granted access
The actual access of users to assets will still be determined by the matrix   =
[
 (</p>
          <p>) − (   )
to asset   , and   ( ,  ) = 0, if not.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>4.3. Improvement of the method (Advanced method)</title>
        <p>
          Despite the obvious advantages, such an approach, which is based on determining the similarity of
the actions of individual users, has significant disadvantages, in particular:
1. The approach works well in those organizations where information resources are clearly
demarcated between employees. That is, sets of information resources of individual
employees do not overlap.
2. In this model, the impact of suspicious employee access to the organization's resources can
be neutralized by the appropriate combination of access to authorized resources.
In order to avoid the mentioned shortcomings, it is suggested to improve the method as follows.
To control user access to the organization's resources, we introduce an access matrix   =
In the situation   , when user #5 tries to bypass the protection system, for which he does not use
one of the permitted resources, for example, asset #1, when calculating the abnormality of the
behavior of user #5, the algorithm will give an erroneous result (Figure 2) . In this case, for user #5,
the degree of abnormality will be only 1.9% and therefore, against the background of general
indicators from 4.0% to 2.8%, it will be impossible to recognize an insider attack [
          <xref ref-type="bibr" rid="ref12">16</xref>
          ].
        </p>
        <p>In the same situation, when applying the improved methodology, in both cases (when user #5
access is attempted without bypassing the protection system and with the protection system
bypassed), we get a result that clearly indicates the anomalous behavior of user #5 (Figure 3).</p>
      </sec>
      <sec id="sec-3-3">
        <title>5.2. Scenario 2</title>
        <p>
          In the previous scenario, the organization's information assets were clearly demarcated between
users. However, this situation in most organizations is the exception rather than the rule. As a rule,
when performing tasks, employees of organizations very often use common resources. In this case,
the application of the method based on the similarity matrix [
          <xref ref-type="bibr" rid="ref13">17</xref>
          ] gives extremely contradictory
results that cannot be interpreted.
        </p>
        <p>As in Scenario 1, we denote the access rights of users to the assets of the organization by the
matrix   . The fact of user access to assets is denoted by the access matrix   . In the matrix of actual
access, let's mark with red symbols "1" attempts of users to gain unauthorized access to assets, and
with "0" symbols in brown</p>
        <p>authorized assets that were not used by users. In this case, the matrices
  and   , as an example, can have the form
  = 1</p>
        <p>0 ,   = 1
0
0
1
1
0
0
1
1
1
0
0
0
0
0
1 
1</p>
        <p>1 
0
0
1
1
0
0
1
1
1
0

0
0
[1 
1 
1 
0
1
1
0
1
1
1
0
0
0
0
1 
1 
0 
1
0
1
0
0
0
1
1
1
1
0
1
1
0
0
1
1

1
1
1
0
1
1
1
0
0
1
1
1
0 
1 

1
0
0
1
1
0
1
1
0
1
1

1
1
0
0
1
0
0
1
1
1
0
0
0
0
0 
0 
0 
1
1
0
1
1
1
1
1
1
0
0
0
1
1
0
1
0
1
1
1
1
1
1
0
1
0
0
0
0
0
0
1
1
1
1
1
1
0 . (6)</p>
        <p>We simulate the situation described by matrices (6) using the similarity algorithm and the
improved method. The results of modeling using the similarity algorithm and the improved method
are shown in Figure 4 and Figure 5.</p>
        <p>
          As we can see from Figure 4, in the case when the access rights of different users overlap (when
users can use shared resources), the similarity algorithm gives results that do not unambiguously
indicate anomalies in user behavior. At the same time, the results in Figure 5 fully reproduce the
pattern of malicious activity described by the matrix   . At the same time, the system can also
determine the level of malicious activity [
          <xref ref-type="bibr" rid="ref14 ref15">18, 19</xref>
          ]. In particular, the matrix   of formula (6) shows
that attempts to gain unauthorized access to the organization's assets were made by users #1, #2, #4,
#6, #9. At the same time, user #6 made 2 such attempts, and user #9 made three such attempts. The
results of the application of the improved technique give indicators for user #6 at the level of 22.2%,
and for #9 33.3%. At the same time, for other malicious actions of users #1, #2, #4, the result is
within 9.09...14.3%, which clearly distinguishes more dangerous users against the background of less
dangerous ones. The separation of suspicious activity into different levels is important from the point
of view of identifying real insiders, because in this case it is possible to reject those users who make
unintentionally erroneous actions with information assets. In this way, the system will be more
protected against false alarms.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>6. Conclusions</title>
      <p>The improved method given in this article makes it possible to unambiguously determine that the
user's interaction with some information asset of the organization is anomalous. This, in turn, may
indicate a possible insider attack. The results of the application of the improved method may be
transferred to the information security administrator for further analysis and action. It is assumed
that in some cases such an approach will not allow to reliably determine whether a given activity is
a malicious activity, since such an analysis does not take into account the context of interaction and
the reason for its occurrence, in addition, other, personal characteristics of a specific user are not
taken into account. In any case, the application of this technique is advisable in combination with
the analysis of other indicators that allow determining the presence of the user's propensity for
malicious activity, for example, taking into account the loyalty of the staff.</p>
      <p>By integrating real-time monitoring and behavior profiling, the technique can serve as an early
warning system, flagging users whose actions deviate significantly from established norms. This can
allow security administrators to intervene promptly, reducing response times and minimizing
potential damage. Moreover, combining this method with context-aware analysis and psychological
profiling could provide a more holistic approach to insider threat management, balancing
technological detection with an understanding of human factors.</p>
      <p>Future research in this area could explore the integration of machine learning techniques with
the proposed method to enhance the detection of insider threats in more complex organizational
environments. Specifically, incorporating predictive analytics and anomaly detection algorithms
could improve the system's ability to identify patterns of malicious behavior even when insiders
attempt to mask their activity.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[5]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Smolev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gamza</surname>
          </string-name>
          ,
          <article-title>The method of detecting anomalies of user interaction with the organization's information resources</article-title>
          ,
          <source>Modern information security 4</source>
          (
          <issue>56</issue>
          ) (
          <year>2023</year>
          )
          <article-title>6 12</article-title>
          . doi:
          <volume>10</volume>
          .31673/
          <fpage>2409</fpage>
          -
          <lpage>7292</lpage>
          .
          <year>2023</year>
          .
          <volume>030101</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dzyuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Matsko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Novikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Havryliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Polovenko</surname>
          </string-name>
          , Time Aspect of Insider Threat Mitigation,
          <source>Advances in Military Technology</source>
          <volume>19</volume>
          (
          <issue>1</issue>
          ) (
          <year>2024</year>
          )
          <fpage>149</fpage>
          -
          <lpage>164</lpage>
          . doi:
          <volume>10</volume>
          .3849/aimt.
          <year>01830</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Jeffrey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Villar</surname>
          </string-name>
          ,
          <article-title>A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems</article-title>
          ,
          <source>Electronics</source>
          <volume>12</volume>
          (
          <year>2023</year>
          )
          <article-title>3283</article-title>
          . doi:
          <volume>10</volume>
          .3390/electronics12153283.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Ruban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. O.</given-names>
            <surname>Martovytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Partyka</surname>
          </string-name>
          ,
          <source>Classification of anomaly detection methods in URL: 3rd Artificial Intelligence and Cloud Computing Conference (AICCC 2020) Kyoto, Japan</source>
          <volume>18</volume>
          20.12 (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1145/3442536.3442550
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Nicheporuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Kazantsev</surname>
          </string-name>
          ,
          <article-title>An intelligent system for detecting anomalies and identifying smart home devices using collective communication</article-title>
          ,
          <source>Electrical and computer systems 34(110)</source>
          (
          <year>2021</year>
          )
          <fpage>50</fpage>
          -
          <lpage>61</lpage>
          . URL: https://eltecs.op.edu.ua/index.php/journal/article/download/3196/1118/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H. L. Mezones</given-names>
            <surname>Santana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. E. Cobeña</given-names>
            <surname>Macias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Quimiz</surname>
          </string-name>
          <string-name>
            <surname>Moreira</surname>
          </string-name>
          ,
          <article-title>Anomaly Detection Method in Computer Systems by Means of Machine Learning</article-title>
          , in: M. Zambrano Vizuete (Ed.),
          <source>Innovation and Research A Driving Force for Socio-Econo-Technological Development, Lecture Notes in Networks and Systems</source>
          ,
          <volume>511</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -11438-0_
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Cinque</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. Della</given-names>
            <surname>Corte</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Pecchia,</surname>
          </string-name>
          <article-title>Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs</article-title>
          ,
          <source>Journal of Network and Computer Applications</source>
          <volume>208</volume>
          (
          <year>2022</year>
          )
          <article-title>103515</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jnca.
          <year>2022</year>
          .
          <volume>103515</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <article-title>-Based Anomaly Detection System for Cloud Engineering</article-title>
          (ICDE) (
          <year>2021</year>
          ). URL: https://ieeexplore.ieee.
          <source>org/document/9458872. Society Technical Committee on Data Engineering</source>
          <volume>24</volume>
          (
          <issue>4</issue>
          ) (
          <year>2001</year>
          ):
          <fpage>35</fpage>
          <lpage>43</lpage>
          . URL: http://singhal.info/ieee2001.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dzyuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Laptieva</surname>
          </string-name>
          .
          <source>Theory (ATIT)</source>
          , Kyiv, Ukraine, (
          <year>2021</year>
          ) 99 105, doi: 10.1109/ATIT54053.
          <year>2021</year>
          .
          <volume>9678599</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>G.</given-names>
            <surname>Saunders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hitchens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Varadharajan</surname>
          </string-name>
          ,
          <article-title>Role-Based Access Control and the Access Control Matrix</article-title>
          ,
          <source>Operating Systems Review</source>
          <volume>35</volume>
          (
          <year>2003</year>
          )
          <fpage>145</fpage>
          157. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -39927-8_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Viswanath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bashir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Crovella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Guha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Gummadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Krishnamurthy</surname>
          </string-name>
          ,
          <article-title>and A. of the 23rd USENIX Security Symposium (USENIX Security) (</article-title>
          <year>2014</year>
          )
          <article-title>223 238</article-title>
          . URL: https://www.researchgate.net/publication/310793105_Towards_
          <article-title>detecting_ anomalous_user_behavior_in_online_social_networks.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Daubner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Macak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. .</given-names>
            <surname>Buhnova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. .</given-names>
            <surname>Pitner</surname>
          </string-name>
          ,
          <article-title>Addressing insider attacks via forensic-ready risk management</article-title>
          ,
          <source>Journal of Information Security and Applications</source>
          <volume>73</volume>
          (
          <year>2023</year>
          )
          <article-title>103433</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jisa.
          <year>2023</year>
          .
          <volume>103433</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Alves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sales</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ashworth</surname>
          </string-name>
          ,
          <article-title>Does outcome measurement of treatment for substance use disorder reflect the personal concerns of patients? A scoping review of measures recommended in Europe</article-title>
          ,
          <source>Drug and Alcohol Dependence</source>
          <volume>179</volume>
          (
          <year>2017</year>
          )
          <fpage>299</fpage>
          308. doi:
          <volume>10</volume>
          .1016/j.drugalcdep.
          <year>2017</year>
          .
          <volume>05</volume>
          .049.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Divakaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Thing</surname>
          </string-name>
          , Insider Threat Detection and its Future Directions,
          <source>International Journal of Security and Networks</source>
          <volume>12</volume>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1504/IJSN.
          <year>2017</year>
          .
          <volume>10005217</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sosnovyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lashchevska</surname>
          </string-name>
          ,
          <article-title>Detection of malicious activity using a neural network for continuous operation</article-title>
          ,
          <source>Cybersecurity: Education, Science, Technique</source>
          <volume>3</volume>
          (
          <year>2024</year>
          )
          <fpage>213</fpage>
          224. doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>23</volume>
          .213224.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>