{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:23:11Z","timestamp":1753881791923,"version":"3.41.2"},"reference-count":33,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:p> Machine learning (ML) is currently a crucial tool in the field of cyber security. Through the identification of patterns, the mapping of cybercrime in real time, and the execution of in-depth penetration tests, ML is able to counter cyber threats and strengthen security infrastructure. Security in any organization depends on monitoring and analyzing user actions and behaviors. Due to the fact that it frequently avoids security precautions and does not trigger any alerts or flags, it is much more challenging to detect than traditional malicious network activity. ML is an important and rapidly developing anomaly detection field in order to protect user security and privacy, a wide range of applications, including various social media platforms, have incorporated cutting-edge techniques to detect anomalies. A social network is a platform where various social groups can interact, express themselves, and share pertinent content. By spreading propaganda, unwelcome messages, false information, fake news, and rumours, as well as by posting harmful links, this social network also encourages deviant behavior. In this research, we introduce Deep Belief Network (DBN) with Triple DES, a hybrid approach to anomaly detection in unbalanced classification. The results show that the DBN-TDES model can typically detect anomalous user behaviors that other models in anomaly detection cannot. <\/jats:p>","DOI":"10.1142\/s0218843023500168","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T10:35:32Z","timestamp":1695206132000},"source":"Crossref","is-referenced-by-count":3,"title":["Deep Belief Network-Based User and Entity Behavior Analytics (UEBA) for Web Applications"],"prefix":"10.1142","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0207-6802","authenticated-orcid":false,"given":"S.","family":"Deepa","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Umamageswari","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Neelakandan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, R.M.K Engineering College, Kavaraipettai, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hanumanthu","family":"Bhukya","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering (Networks), Kakatiya Institute of Technology and Science, Warangal Telangana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"I. V.","family":"Sai Lakshmi Haritha","sequence":"additional","affiliation":[{"name":"Department of Information Technology, MLR Institute of Technology, Hyderabad, Telangana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manjula","family":"Shanbhog","sequence":"additional","affiliation":[{"name":"Department of Sciences, CHRIST (Deemed to be University), Delhi NCR, Ghaziabad, Uttar Pradesh 201003, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"219","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"first-page":"1","volume-title":"2016 IEEE Int. Conf. Big Data Analysis (ICBDA)","author":"Xu H.","key":"S0218843023500168BIB002"},{"key":"S0218843023500168BIB003","doi-asserted-by":"publisher","DOI":"10.17835\/2076-6297.2021.13.2.006-026"},{"key":"S0218843023500168BIB004","first-page":"14","volume":"2021","author":"Wang X.","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"S0218843023500168BIB005","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2018.1560920"},{"first-page":"197","volume-title":"2018 IEEE 4th Int. Conf. Collaboration and Internet Computing (CIC)","author":"Heredia B.","key":"S0218843023500168BIB006"},{"key":"S0218843023500168BIB007","first-page":"280","volume-title":"Proc. 11th Int. Conf. Web and Social Media (ICWSM 2017)","volume":"11","author":"Varol O."},{"key":"S0218843023500168BIB008","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7311"},{"key":"S0218843023500168BIB009","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691320500277"},{"key":"S0218843023500168BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.109546"},{"key":"S0218843023500168BIB011","first-page":"251","volume-title":"European Symp. Artificial Neural Networks, Computational Intelligence and Machine Learning","author":"Muliukha V.","year":"2020"},{"journal-title":"Gartner Research","year":"2016","author":"Ahlm E.","key":"S0218843023500168BIB012"},{"first-page":"1867","volume-title":"2016 IEEE Int. Conf. Big Data (Big Data)","author":"Shashanka M.","key":"S0218843023500168BIB013"},{"journal-title":"Growth & Industry Research Report","year":"2019","author":"Sharma A.","key":"S0218843023500168BIB014"},{"key":"S0218843023500168BIB015","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0029-9_50"},{"first-page":"581","volume-title":"2019 IFIP\/IEEE Symp. Integrated Network and Service Management (IM)","author":"Karmakar K. K.","key":"S0218843023500168BIB016"},{"first-page":"1","volume-title":"2020 IEEE 19th Int. Symp. Network Computing and Applications (NCA)","author":"Vishwakarma L.","key":"S0218843023500168BIB017"},{"first-page":"60","volume-title":"2020 Fourth Int. Conf. I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","author":"Solomon Doss J. K.","key":"S0218843023500168BIB018"},{"key":"S0218843023500168BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"S0218843023500168BIB020","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8828591"},{"key":"S0218843023500168BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037032"},{"journal-title":"Gartner Information Technology Research","year":"2018","author":"Sadowski G.","key":"S0218843023500168BIB022"},{"first-page":"1","volume-title":"2018 Int. Conf. Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","author":"Salitin M. A.","key":"S0218843023500168BIB023"},{"key":"S0218843023500168BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.05.022"},{"key":"S0218843023500168BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-94102-4_6"},{"key":"S0218843023500168BIB026","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X211031485"},{"key":"S0218843023500168BIB027","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.022209"},{"journal-title":"J. Exp. Theor. Artif. Intell.","year":"2022","author":"Neelakandan S.","key":"S0218843023500168BIB028"},{"key":"S0218843023500168BIB029","first-page":"13","volume":"2022","author":"Neelakandan S.","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"S0218843023500168BIB030","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/954\/1\/012009"},{"key":"S0218843023500168BIB031","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5594175"},{"key":"S0218843023500168BIB032","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1703696"},{"key":"S0218843023500168BIB033","doi-asserted-by":"publisher","DOI":"10.3390\/app10155208"},{"key":"S0218843023500168BIB034","doi-asserted-by":"publisher","DOI":"10.1177\/1460458220957486"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843023500168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T09:03:32Z","timestamp":1718183012000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218843023500168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":33,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["10.1142\/S0218843023500168"],"URL":"https:\/\/doi.org\/10.1142\/s0218843023500168","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"type":"print","value":"0218-8430"},{"type":"electronic","value":"1793-6365"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"article-number":"2350016"}}