18.1 Introduction

Chapters 16 and 17 described our stream mining techniques for insider threat detection. In particular, ensemble-based techniques for nonsequence data were discussed. We also discussed both supervised and unsupervised earning methods. We also discussed stream mining for nonsequence data. We have argued that we need scalable stream mining techniques as massive amounts of data streams have to be analyzed for insider threat detection.

In this chapter, we will discuss our testing methodology and experimental results. The organization of this chapter is as follows. The dataset we used is discussed in Section 18.2. Experimental setup is discussed in Section 18.3. Results are presented ...

Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.