Users’ scenario-base for analysing insider threat detection based on user’s downloads activity logs

Research output: Book chapter/Published conference paperConference paperpeer-review

1 Citation (Scopus)

Abstract

The persistence and growth of insider threats pose a significant challenge to the information security community. Malicious insiders have been identified as one of the most detrimental threats to sensitive data including systems of enterprises and government agencies. Detecting insider threats presents a unique set of challenges, including dealing with large and imbalanced datasets and limited availability of ground truth information. Insider threats pose a serious risk to organizations, financial institutions, and government agencies. Former and current employees often exploit their trusted positions to disrupt regular organizational functions or unlawfully disclose classified or confidential information for personal or group gain. These actions can lead to severe financial, reputational, and operational consequences for the affected entities. To address this pressing issue, the research presented in this paper proposes a user-centric approach for insider threat detection. This approach focuses on leveraging downloads activity logs to analyse and detect patterns associated with insider threats. By examining user behaviours related to downloading activities, valuable insights to gained, and existing detection techniques can be enhanced. The proposed methodology aims to provide practical solutions for identifying and mitigating potential insider threats within organisations. Among the selected classifiers, RandomTree exhibited the highest accuracy rate of 0.981%, making it the most suitable option for the insider threat detection system. The accuracy rate indicates the overall correctness of the model’s predictions, with a higher value indicating a better performance in classifying instances correctly.

Original languageEnglish
Title of host publicationAdvances in Information and Communication
Subtitle of host publicationProceedings of the 2024 Future of Information and Communication Conference (FICC), Volume 2
EditorsKohei Arai
Place of PublicationSwitzerland
PublisherSpringer Science and Business Media Deutschland GmbH
Pages457-472
Number of pages16
Volume2
ISBN (Electronic)9783031539633
ISBN (Print)9783031539626
DOIs
Publication statusPublished - 2024
EventFuture of Information and Communication Conference, FICC 2024 - Novotel Berlin Am Tiergarten, Berlin, Germany
Duration: 04 Apr 202405 Apr 2024
https://saiconference.com/Conferences/FICC2024 (Conference website and proceedings)
https://saiconference.com/Downloads/FICC2024/Agenda.pdf (Agenda)
https://link.springer.com/content/pdf/bfm:978-3-031-53963-3/1 (Front matter)
https://www.amazon.com/Advances-Information-Communication-Proceedings-Conference/dp/3031539621 (Presentation evidence)

Publication series

NameLecture Notes in Networks and Systems
Volume920 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceFuture of Information and Communication Conference, FICC 2024
Country/TerritoryGermany
CityBerlin
Period04/04/2405/04/24
OtherThe Future of Information and Communication Conference (FICC) 2024, held on April 4-5 in Berlin, Germany, showcased groundbreaking insights from esteemed keynote speakers Mathias Fink, Marios Kountouris, Marcel Worring, and Sören Auer. With 139 paper presentations from a pool of 401 submissions, the event boasted a exceptional acceptance rate, highlighting the rigor of selection. Delegates from 55 countries convened to explore cutting-edge research and trends in information technology and communication. The evening Spree river cruise on April 4 provided a picturesque setting for networking among participants, fostering collaboration and camaraderie. FICC 2024 epitomized global collaboration and innovation in the field.
Internet address

Fingerprint

Dive into the research topics of 'Users’ scenario-base for analysing insider threat detection based on user’s downloads activity logs'. Together they form a unique fingerprint.

Cite this