{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T18:06:24Z","timestamp":1744826784443},"reference-count":15,"publisher":"World Scientific Pub Co Pte Lt","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2016,4]]},"abstract":"<jats:p> Insider threads posed by authorized users have caused significant security and privacy risks to IT systems. The behavior of authorized users in using system services must be monitored and controlled. However, the administrators in large distributed systems are overwhelmed by the number of system users, the complexity and changing nature of user activities. This paper presents a new generation of intelligent decision support systems that effectively assist system administrators to get deep insight into the system users\u2019 dynamic behavior patterns. With these patterns, the system administrators are capable of constructing dynamic refinement to the existing security policies. We explore the method of interactively and incrementally extracting user\u2019s behavior patterns by combining data mining techniques with domain and system knowledge, and applying such knowledge to provide recommendations throughout the whole process. A prototype tool has been developed to analyze the audit logs from distributed medical imaging systems to validate the proposed approach. <\/jats:p>","DOI":"10.1142\/s0218194016500169","type":"journal-article","created":{"date-parts":[[2016,5,12]],"date-time":"2016-05-12T07:49:59Z","timestamp":1463039399000},"page":"379-404","source":"Crossref","is-referenced-by-count":2,"title":["Knowledge-Driven User Behavior Pattern Discovery for System Security Enhancement"],"prefix":"10.1142","volume":"26","author":[{"given":"Weina","family":"Ma","sequence":"first","affiliation":[{"name":"Department of Electrical, Computer, and Software Engineering, University of Ontario Institute of Technology, Oshawa, Ontario L1H 7K4, Canada"}]},{"given":"Kamran","family":"Sartipi","sequence":"additional","affiliation":[{"name":"Department of Electrical, Computer, and Software Engineering, University of Ontario Institute of Technology, Oshawa, Ontario L1H 7K4, Canada"}]},{"given":"Duane","family":"Bender","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering Technology, Mohawk College, Hamilton, Ontario L8N 3T2, Canada"}]}],"member":"219","published-online":{"date-parts":[[2016,5,12]]},"reference":[{"issue":"4","key":"S0218194016500169BIB001","doi-asserted-by":"crossref","first-page":"624","DOI":"10.5897\/IJPS11.1381","volume":"7","author":"Stiawan Deris","year":"2012","journal-title":"International Journal of Physical Sciences"},{"key":"S0218194016500169BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"S0218194016500169BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.10.017"},{"key":"S0218194016500169BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"S0218194016500169BIB007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-2012-0454","author":"Yarmand Mohammad H.","year":"2013","journal-title":"Journal of Computer Security"},{"key":"S0218194016500169BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"S0218194016500169BIB010","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"key":"S0218194016500169BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"S0218194016500169BIB012","volume":"99","author":"Garofalakis Minos N.","year":"1999","journal-title":"VLDB"},{"key":"S0218194016500169BIB013","first-page":"136","volume-title":"IEEE Transactions Knowledge and Data Engineering","author":"Yu Chung-Ching","year":"2005"},{"key":"S0218194016500169BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/11495772_62"},{"key":"S0218194016500169BIB015","first-page":"259","volume-title":"Data Mining and Knowledge Discovery","author":"Mannila Heikki","year":"1997"},{"key":"S0218194016500169BIB016","volume-title":"Decision Support Systems: Concepts and Resources for Managers","author":"Power Daniel J.","year":"2002"},{"issue":"10","key":"S0218194016500169BIB017","volume":"13","author":"Hamad Murtadha M.","year":"2013","journal-title":"Global Journal of Management And Business Research"},{"key":"S0218194016500169BIB022","doi-asserted-by":"publisher","DOI":"10.1145\/335191.336572"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194016500169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T20:29:53Z","timestamp":1565123393000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194016500169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":15,"journal-issue":{"issue":"03","published-online":{"date-parts":[[2016,5,12]]},"published-print":{"date-parts":[[2016,4]]}},"alternative-id":["10.1142\/S0218194016500169"],"URL":"https:\/\/doi.org\/10.1142\/s0218194016500169","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}