2019
DOI: 10.3390/app9194018
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms

Abstract: Insider threats are malicious activities by authorized users, such as theft of intellectual property or security information, fraud, and sabotage. Although the number of insider threats is much lower than external network attacks, insider threats can cause extensive damage. As insiders are very familiar with an organization’s system, it is very difficult to detect their malicious behavior. Traditional insider-threat detection methods focus on rule-based approaches built by domain experts, but they are neither … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
4

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 24 publications
0
27
0
4
Order By: Relevance
“…Anomaly detection, also known as behaviour-based detection, assumes that behaviour that determines the attacker’s likely activity is different from the behaviour of a permitted network user [ 53 ]. IDS supporting anomaly-based detection is highly effective at finding zero-day attacks; however, it generates high volumes of false positives.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Anomaly detection, also known as behaviour-based detection, assumes that behaviour that determines the attacker’s likely activity is different from the behaviour of a permitted network user [ 53 ]. IDS supporting anomaly-based detection is highly effective at finding zero-day attacks; however, it generates high volumes of false positives.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…From previous research [12][13][14] and descriptions related to insider threat detection and analysis based on machine learning methodology, we selected the classification and clustering concepts as well as the related techniques [15,16] for anomaly detection and misuse as the main scope of this research.…”
Section: Insider Threats Based On Machine Learning Approachmentioning
confidence: 99%
“…Consequently, the following MC pairwise transitional training matrix T MC was created, as indicated by Equation (14). For comprehensive training, this was repeated 2 n (n < 10) times.…”
Section: Final Mrimentioning
confidence: 99%
“…Thus, if the activities of malicious codes are analyzed in detail, existing and potential threats can be considered simultaneously. This is because if the type of malware detected during static/dynamic analysis of malicious code is reclassified, and the malicious activities (MAs) [14] involved are identified and quantified, the purpose, means, and strategy of an attacker attacking his/her organization can be inferred. This is a critical process for improving the organization's information protection system and establishing an intelligent cyber defense strategy.…”
Section: Introductionmentioning
confidence: 99%