Machine Learning Based Insider Threat Modelling and Detection
Title | Machine Learning Based Insider Threat Modelling and Detection |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Le, Duc C., Nur Zincir-Heywood, A. |
Conference Name | 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) |
Date Published | apr |
Keywords | Collaboration, cyber-security, damaging threats, Data collection, feature extraction, Human Behavior, insider scenario specific results, insider threat, insider threat detection system, insider threat modelling, learning (artificial intelligence), Logistics, machine learning, machine learning algorithms, malicious insider attacks, Metrics, multiple data granularity levels, Organizations, policy-based governance, pubcrawl, resilience, Resiliency, security, security of data, user-centered machine learning |
Abstract | Recently, malicious insider attacks represent one of the most damaging threats to companies and government agencies. This paper proposes a new framework in constructing a user-centered machine learning based insider threat detection system on multiple data granularity levels. System evaluations and analysis are performed not only on individual data instances but also on normal and malicious insiders, where insider scenario specific results and delay in detection are reported and discussed. Our results show that the machine learning based detection system can learn from limited ground truth and detect new malicious insiders with a high accuracy. |
URL | https://ieeexplore.ieee.org/document/8717892 |
Citation Key | le_machine_2019 |
- machine learning
- user-centered machine learning
- security of data
- security
- Resiliency
- resilience
- pubcrawl
- policy-based governance
- Organizations
- multiple data granularity levels
- Metrics
- malicious insider attacks
- machine learning algorithms
- Cyber-security
- Logistics
- learning (artificial intelligence)
- insider threat modelling
- insider threat detection system
- insider threat
- insider scenario specific results
- Human behavior
- feature extraction
- Data collection
- damaging threats
- collaboration