Chih-Hung Hsieh, Cheng-Hao Yan, Ching-Hao Mao, Chi-Ping Lai, Jenq-Shiou Leu
{"title":"GMiner: Rule-Based Fuzzy Clustering for Google Drive Behavioral Type Mining","authors":"Chih-Hung Hsieh, Cheng-Hao Yan, Ching-Hao Mao, Chi-Ping Lai, Jenq-Shiou Leu","doi":"10.1109/ICS.2016.0028","DOIUrl":null,"url":null,"abstract":"Due to more and more on-premises services are migrating onto cloud, user behavioral analysis then gets popular as a data-driven way to administer lots accounts of on-cloud services. This paper proposes a novel rule-based approach, GMiner, for mining different types of Google cloud drive usages as an unsupervised account-management approach. Experiment results show that GMiner provides accurate, inter-pretable, and visualized clustering results which are helpful for highlighting inactive, quasi-insider accounts, or other potential cyber-security risks from real-environment dataset.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Computer Symposium (ICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICS.2016.0028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Due to more and more on-premises services are migrating onto cloud, user behavioral analysis then gets popular as a data-driven way to administer lots accounts of on-cloud services. This paper proposes a novel rule-based approach, GMiner, for mining different types of Google cloud drive usages as an unsupervised account-management approach. Experiment results show that GMiner provides accurate, inter-pretable, and visualized clustering results which are helpful for highlighting inactive, quasi-insider accounts, or other potential cyber-security risks from real-environment dataset.