Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset

被引:21
|
作者
Sheykhkanloo, Naghmeh Moradpoor [1 ,2 ,3 ,4 ]
Hall, Adam [5 ]
机构
[1] Edinburgh Napier Univ, Sch Comp, Cybersecur & Networks, Edinburgh, Midlothian, Scotland
[2] Edinburgh Napier Univ, Sch Comp, MSc Adv Secur & Cybercrime, Edinburgh, Midlothian, Scotland
[3] Edinburgh Napier Univ, Sch Comp, Ctr Distributed Comp Networking & Cybersecur, Edinburgh, Midlothian, Scotland
[4] Edinburgh Napier Univ, Sch Comp, Cyber Acad, Edinburgh, Midlothian, Scotland
[5] Edinburgh Napier Univ, Edinburgh, Midlothian, Scotland
关键词
Data Pre-Processing; Imbalanced Dataset; Insider Threat; Spread Subsample; Supervised Machine Learning;
D O I
10.4018/IJCWT.2020040101
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
An insider threat can take on many forms and fall under different categories. This includes malicious insider, careless/unaware/uneducated/naive employee, and the third-party contractor. Machine learning techniques have been studied in published literature as a promising solution for such threats. However, they can be biased and/or inaccurate when the associated dataset is hugely imbalanced. Therefore, this article addresses the insider threat detection on an extremely imbalanced dataset which includes employing a popular balancing technique known as spread subsample. The results show that although balancing the dataset using this technique did not improve performance metrics, it did improve the time taken to build the model and the time taken to test the model. Additionally, the authors realised that running the chosen classifiers with parameters other than the default ones has an impact on both balanced and imbalanced scenarios, but the impact is significantly stronger when using the imbalanced dataset.
引用
收藏
页码:1 / 26
页数:26
相关论文
共 50 条
  • [31] Optimal Machine Learning Algorithms for Cyber Threat Detection
    Farooq, Hafiz M.
    Otaibi, Naif M.
    2018 UKSIM-AMSS 20TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2018, : 32 - 37
  • [32] Behavioral Based Insider Threat Detection Using Deep Learning
    Nasir, Rida
    Afzal, Mehreen
    Latif, Rabia
    Iqbal, Waseem
    IEEE ACCESS, 2021, 9 : 143266 - 143274
  • [33] Wind Turbine Blade Damage Detection Using Supervised Machine Learning Algorithms
    Regan, Taylor
    Beale, Christopher
    Inalpolat, Murat
    JOURNAL OF VIBRATION AND ACOUSTICS-TRANSACTIONS OF THE ASME, 2017, 139 (06):
  • [34] Anomaly detection in NetFlow network traffic using supervised machine learning algorithms
    Fosic, Igor
    Zagar, Drago
    Grgic, Kresimir
    Krizanovic, Visnja
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2023, 33
  • [35] Handling Imbalanced Dataset Classification in Machine Learning
    Yadav, Seema
    Bhole, Girish P.
    2020 IEEE PUNE SECTION INTERNATIONAL CONFERENCE (PUNECON), 2020, : 38 - 43
  • [36] Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection
    Carvallo, Pamela
    Cavalli, Ana R.
    Kushik, Natalia
    ICSOFT: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2017, : 480 - 487
  • [37] A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods
    Alzaabi, Fatima Rashed
    Mehmood, Abid
    IEEE ACCESS, 2024, 12 : 30907 - 30927
  • [38] Sampling-Based Machine Learning Models for Intrusion Detection in Imbalanced Dataset
    Fan, Zongwen
    Sohail, Shaleeza
    Sabrina, Fariza
    Gu, Xin
    ELECTRONICS, 2024, 13 (10)
  • [39] Active learning-assisted semi-supervised learning for fault detection and diagnostics with imbalanced dataset
    Peng, Xiaomeng
    Jin, Xiaoning
    Duan, Shiming
    Sankavaram, Chaitanya
    IISE TRANSACTIONS, 2023, 55 (07) : 672 - 686
  • [40] Cloud Insider Attack Detection Using Machine Learning
    Nathezhtha, T.
    Vaidehi, V.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 60 - 65