18.1 Introduction

Chapters 16 and 17 described our stream mining techniques for insider threat detection. In particular, ensemble-based techniques for nonsequence data were discussed. We also discussed both supervised and unsupervised earning methods. We also discussed stream mining for nonsequence data. We have argued that we need scalable stream mining techniques as massive amounts of data streams have to be analyzed for insider threat detection.

In this chapter, we will discuss our testing methodology and experimental results. The organization of this chapter is as follows. The dataset we used is discussed in Section 18.2. Experimental setup is discussed in Section 18.3. Results are presented ...

Get Big Data Analytics with Applications in Insider Threat Detection now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.