Research Article

Image-Based Insider Threat Detection via Geometric Transformation

Table 1

Feature structure.

Feature = time + PC + activity
TimeWorkhour, afterhour, weekend, wholePCOwn pc, other’s pc, whole

ActivityLogonlogon_times
Filefile_oper_times, doc_oper_times, exe_oper_times
Httphttp_oper_times, job_oper_times, leak_oper_times
E-mailE-mail_oper_times, e-mail_mean_size_atts
Deviceusb_oper_times