Detection and prediction of anomalous behaviors of enterprise's employees based on data-mining and optimization algorithm

被引:0
作者
Zhang, Xiao [1 ]
Meng, Yutong [2 ]
机构
[1] Changchun Univ Finance & Econ, Sch Management, Changchun 130000, Jilin, Peoples R China
[2] Univ Southampton, Film & Philosophy Humanities, Southampton SO17 1BJ, England
关键词
Internal threat; Knowledge graph; Sparrow search algorithm (SSA); Anomalous behaviors; Resignation prediction;
D O I
10.1038/s41598-024-68315-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internal employees have always been at the core of organizational security management challenges. Once an employee exhibits behaviors that threaten the organization, the resulting damage can be profound. Therefore, analyzing reasonably stored behavioral data can equip managers with effective threat monitoring and warning solutions. Through data-mining, a knowledge graph for internal threat data is deduced, and models for detecting anomalous behaviors and predicting resignations are developed. Initially, data-mining is employed to model the knowledge ontology of internal threats and construct the knowledge graph; subsequently, using the behavioral characteristics, the BP neural network is optimized with the Sparrow Search Algorithm (SSA), establishing a detection model for anomalous behaviors (SBP); additionally, behavioral sequences are processed through data feature vectorization. Utilizing SBP, the LSTM network is further optimized, creating a predictive model for employee behaviors (SLSTM); ultimately, SBP detects anomalous behaviors, while SLSTM predicts resignation intentions, thus enhancing detection strategies for at-risk employees. The integration of these models forms a comprehensive threat detection technology within the organization. The efficacy and practicality of detecting anomalous behaviors and predicting resignations using SBP and SLSTM are demonstrated, comparing them with other algorithms and analyzing potential causes of misjudgment. This work has enhanced the detection efficiency and update speed of abnormal employee behaviors, lowered the misjudgment rate, and significantly mitigated the impact of internal threats on the organization.
引用
收藏
页数:13
相关论文
共 27 条
[1]   A new intelligent multilayer framework for insider threat detection [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Abidin, Z. Zainal ;
Abdulkareem, Karrar Hameed ;
Mohammed, Mazin Abed ;
Gupta, Deepak ;
Shankar, K. .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
[2]   Optimal weighted fusion based insider data leakage detection and classification model for Ubiquitous computing systems [J].
Alabdulkreem, Eatedal ;
Alduailij, Mai ;
Alduailij, Mona ;
Mansour, Romany F. .
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 54
[3]   A Multi-Tiered Framework for Insider Threat Prevention [J].
Alsowail, Rakan A. ;
Al-Shehari, Taher .
ELECTRONICS, 2021, 10 (09)
[4]   Ultra Short-Term Wind Power Forecasting Based on Sparrow Search Algorithm Optimization Deep Extreme Learning Machine [J].
An, Guoqing ;
Jiang, Ziyao ;
Chen, Libo ;
Cao, Xin ;
Li, Zheng ;
Zhao, Yuyang ;
Sun, Hexu .
SUSTAINABILITY, 2021, 13 (18)
[5]   A Review of Probabilistic Opinion Pooling Algorithms with Application to Insider Threat Detection [J].
Beekman, Jared A. ;
Woodaman, Ronald F. A. ;
Buede, Dennis M. .
DECISION ANALYSIS, 2020, 17 (01) :39-55
[6]   Explainable Recommendation Based on Weighted Knowledge Graphs and Graph Convolutional Networks [J].
Boughareb, Rima ;
Seridi, Hassina ;
Beldjoudi, Samia .
JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2023, 22 (03)
[7]   Insider threat prevention in distributed database as a service cloud environment [J].
Deep, Gaurav ;
Sidhu, Jagpreet ;
Mohana, Rajni .
COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 169
[8]   Sequential patent trading recommendation using knowledge-aware attentional bidirectional long short-term memory network (KBiLSTM) [J].
Du, Wei ;
Jiang, Guanran ;
Xu, Wei ;
Ma, Jian .
JOURNAL OF INFORMATION SCIENCE, 2023, 49 (03) :814-830
[9]   Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations [J].
Erola, Arnau ;
Agrafiotis, Ioannis ;
Goldsmith, Michael ;
Creese, Sadie .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
[10]   Hydrological time series prediction by extreme machine learning and sparrow search algorithm [J].
Feng, Bao-fei ;
Xu, Yin-shan ;
Zhang, Tao ;
Zhang, Xiao .
WATER SUPPLY, 2022, 22 (03) :3143-3157