E-Watcher: insider threat monitoring and detection for enhanced security

被引:3
|
作者
Wei, Zhiyuan [1 ]
Rauf, Usman [2 ]
Mohsen, Fadi [3 ]
机构
[1] Rocky Mt Robotech, Broomfield, CO USA
[2] Mercy Coll, Dept Math & Comp Sci, Dobbs Ferry, NY 10522 USA
[3] Univ Groningen, Bernoulli Inst Math Comp Sci & Artificial Intellig, Groningen, Netherlands
关键词
Behavioral analysis; Information gain; Insider threat detection; Machine learning; Hybrid detection;
D O I
10.1007/s12243-024-01023-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Insider threats refer to harmful actions carried out by authorized users within an organization, posing the most damaging risks. The increasing number of these threats has revealed the inadequacy of traditional methods for detecting and mitigating insider threats. These existing approaches lack the ability to analyze activity-related information in detail, resulting in delayed detection of malicious intent. Additionally, current methods lack advancements in addressing noisy datasets or unknown scenarios, leading to under-fitting or over-fitting of the models. To address these, our paper presents a hybrid insider threat detection framework. We not only enhance prediction accuracy by incorporating a layer of statistical criteria on top of machine learning-based classification but also present optimal parameters to address over/under-fitting of models. We evaluate the performance of our framework using a real-life threat test dataset (CERT r4.2) and compare it to existing methods on the same dataset (Glasser and Lindauer 2013). Our initial evaluation demonstrates that our proposed framework achieves an accuracy of 98.48% in detecting insider threats, surpassing the performance of most of the existing methods. Additionally, our framework effectively handles potential bias and data imbalance issues that can arise in real-life scenarios.
引用
收藏
页码:819 / 831
页数:13
相关论文
共 50 条
  • [1] A Structured Approach to Insider Threat Monitoring for Offensive Security Teams
    Al Sadi, Amir
    Berardi, Davide
    Callegati, Franco
    Melis, Andrea
    Prandini, Marco
    Tolomei, Luca
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [2] Mitigating Insider Threat: A Neural Network Approach for Enhanced Security
    Lavanya, P.
    Glory, H. Anila
    Sriram, V. S. Shankar
    IEEE ACCESS, 2024, 12 : 73752 - 73768
  • [3] Enhanced Insider Threat Detection Model that Increases Data Availability
    Yaseen, Qussai
    Panda, Brajendra
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2011, 6536 : 267 - 277
  • [4] An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection
    Saminathan, Karthikeyan
    Mulka, Sai Tharun Reddy
    Damodharan, Sangeetha
    Maheswar, Rajagopal
    Lorincz, Josip
    FUTURE INTERNET, 2023, 15 (12)
  • [5] A Framework for Data-Driven Physical Security and Insider Threat Detection
    Mavroeidis, Vasileios
    Vishi, Kamer
    Josang, Audun
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 1108 - 1115
  • [6] The insider threat to nuclear safety and security
    Healey, Andrew N.
    SECURITY JOURNAL, 2016, 29 (01) : 23 - 38
  • [7] The insider threat to nuclear safety and security
    Andrew N Healey
    Security Journal, 2016, 29 : 23 - 38
  • [8] Insider Threat Detection: A Review
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Him
    Zhang, Yanchun
    Ye, Wenjie
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 147 - 153
  • [9] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [10] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657