A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods

被引:12
|
作者
Alzaabi, Fatima Rashed [1 ]
Mehmood, Abid [1 ]
机构
[1] Abu Dhabi Univ, Coll Engn, Abu Dhabi, U Arab Emirates
关键词
Insider threat detection; privilege escalation; anomaly detection; user action graph; cyber security; user behavior; temporal information; pre-trained language models; word embedding; CERT dataset;
D O I
10.1109/ACCESS.2024.3369906
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has become a paramount concern in modern times where organizations strive to safeguard their sensitive information and critical assets from malicious actions by individuals with privileged access. This survey paper provides a comprehensive overview of insider threat detection, highlighting its significance in the current landscape of cybersecurity. The review encompasses a broad spectrum of methodologies and techniques, with a particular focus on classical machine-learning approaches and their limitations in effectively addressing the intricacies of insider threats. Furthermore, the survey explores the utilization of modern deep learning and natural language processing (NLP) based methods as promising alternatives, shedding light on their advantages over traditional methods. The comprehensive analysis of results from experiments utilizing NLP and large language models to detect malicious insider threats on the CMU CERT dataset reveals promising insights. Studies surveyed in this paper indicate that these advanced techniques demonstrate notable efficacy in identifying suspicious activities and anomalous behaviors associated with insider threats within organizational systems. Additionally, the survey underscores the potential of NLP and large language model-based approaches, which can enhance threat detection by deciphering textual and contextual information. In the conclusion section, the paper offers valuable insights into the future directions of insider threat detection. It advocates for the integration of more sophisticated time-series-based techniques, recognizing the importance of temporal patterns in insider threat behaviors. These recommendations reflect the evolving nature of insider threats and emphasize the need for proactive, data-driven strategies to safeguard organizations against internal security breaches. In conclusion, this survey not only underscores the urgency of addressing insider threats but also provides a roadmap for the adoption of advanced methodologies to enhance detection and mitigation capabilities in contemporary cybersecurity paradigms.
引用
收藏
页码:30907 / 30927
页数:21
相关论文
共 50 条
  • [1] A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods (vol 12, pg 30907, 2024)
    Alzaabi, Fatima Rashed
    Mehmood, Abid
    IEEE ACCESS, 2024, 12 : 192827 - 192827
  • [2] Deep learning for insider threat detection: Review, challenges and opportunities
    Yuan, Shuhan
    Wu, Xintao
    COMPUTERS & SECURITY, 2021, 104
  • [3] Insider Threat Detection Using Machine Learning Approach
    Sarhan, Bushra Bin
    Altwaijry, Najwa
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [4] Machine Learning for Insider Threat Detection
    Naicker, Tristan Sashlen
    van Niekerk, Brett
    PROCEEDINGS OF THE 3RD EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2021), 2021, : 122 - 131
  • [5] A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
    Al-Mhiqani, Mohammed Nasser
    Ahmad, Rabiah
    Zainal Abidin, Z.
    Yassin, Warusia
    Hassan, Aslinda
    Abdulkareem, Karrar Hameed
    Ali, Nabeel Salih
    Yunos, Zahri
    APPLIED SCIENCES-BASEL, 2020, 10 (15):
  • [6] Handling imbalance dataset issue in insider threat detection using machine learning methods
    Jaiswal, Ayshwarya
    Dwivedi, Pragya
    Dewang, Rupesh Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120
  • [7] Research Opportunity of Insider Threat Detection based on Machine Learning Methods
    Prajitno, Noer Tjahja Moekthi
    Hadiyanto, H.
    Rochim, Adian Fatchur
    2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC, 2023, : 292 - 296
  • [8] Insider threat detection using supervised machine learning algorithms
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Hua
    Zhang, Yanchun
    Ye, Wenjie
    TELECOMMUNICATION SYSTEMS, 2024, 87 (04) : 899 - 915
  • [9] Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment
    Asha, S.
    Shanmugapriya, D.
    Padmavathi, G.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [10] Machine Learning in Manufacturing Ergonomics: Recent Advances, Challenges, and Opportunities
    Lee, Sujee
    Liu, Li
    Radwin, Robert
    Li, Jingshan
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2021, 6 (03) : 5745 - 5752