A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods

被引:12
|
作者
Alzaabi, Fatima Rashed [1 ]
Mehmood, Abid [1 ]
机构
[1] Abu Dhabi Univ, Coll Engn, Abu Dhabi, U Arab Emirates
关键词
Insider threat detection; privilege escalation; anomaly detection; user action graph; cyber security; user behavior; temporal information; pre-trained language models; word embedding; CERT dataset;
D O I
10.1109/ACCESS.2024.3369906
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Insider threat detection has become a paramount concern in modern times where organizations strive to safeguard their sensitive information and critical assets from malicious actions by individuals with privileged access. This survey paper provides a comprehensive overview of insider threat detection, highlighting its significance in the current landscape of cybersecurity. The review encompasses a broad spectrum of methodologies and techniques, with a particular focus on classical machine-learning approaches and their limitations in effectively addressing the intricacies of insider threats. Furthermore, the survey explores the utilization of modern deep learning and natural language processing (NLP) based methods as promising alternatives, shedding light on their advantages over traditional methods. The comprehensive analysis of results from experiments utilizing NLP and large language models to detect malicious insider threats on the CMU CERT dataset reveals promising insights. Studies surveyed in this paper indicate that these advanced techniques demonstrate notable efficacy in identifying suspicious activities and anomalous behaviors associated with insider threats within organizational systems. Additionally, the survey underscores the potential of NLP and large language model-based approaches, which can enhance threat detection by deciphering textual and contextual information. In the conclusion section, the paper offers valuable insights into the future directions of insider threat detection. It advocates for the integration of more sophisticated time-series-based techniques, recognizing the importance of temporal patterns in insider threat behaviors. These recommendations reflect the evolving nature of insider threats and emphasize the need for proactive, data-driven strategies to safeguard organizations against internal security breaches. In conclusion, this survey not only underscores the urgency of addressing insider threats but also provides a roadmap for the adoption of advanced methodologies to enhance detection and mitigation capabilities in contemporary cybersecurity paradigms.
引用
收藏
页码:30907 / 30927
页数:21
相关论文
共 50 条
  • [31] Machine learning and deep learning-based approach in smart healthcare: Recent advances, applications, challenges and opportunities
    Rahman, Anichur
    Debnath, Tanoy
    Kundu, Dipanjali
    Khan, Md. Saikat Islam
    Aishi, Airin Afroj
    Sazzad, Sadia
    Sayduzzaman, Mohammad
    Band, Shahab S.
    AIMS PUBLIC HEALTH, 2024, 11 (01): : 58 - 109
  • [32] Machine learning in fundamental electrochemistry: Recent advances and future opportunities
    Chen, Haotian
    Kaetelhoen, Enno
    Compton, Richard G.
    CURRENT OPINION IN ELECTROCHEMISTRY, 2023, 38
  • [33] Feature learning for bearing prognostics: A comprehensive review of machine/deep learning methods, challenges, and opportunities
    Ayman, Ahmed
    Onsy, Ahmed
    Attallah, Omneya
    Brooks, Hadley
    Morsi, Iman
    MEASUREMENT, 2025, 245
  • [34] Cloud Insider Attack Detection Using Machine Learning
    Nathezhtha, T.
    Vaidehi, V.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 60 - 65
  • [35] MITIGATING MALICIOUS INSIDER ATTACKS IN THE INTERNET OF THINGS USING SUPERVISED MACHINE LEARNING TECHNIQUES
    Ahmad M.S.
    Shah S.M.
    Scalable Computing, 2021, 22 (01): : 13 - 28
  • [36] MITIGATING MALICIOUS INSIDER ATTACKS IN THE INTERNET OF THINGS USING SUPERVISED MACHINE LEARNING TECHNIQUES
    Ahmad, Mir Shahnawaz
    Shah, Shahid Mehraj
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2021, 22 (01): : 13 - 28
  • [37] Malicious URL and Intrusion Detection using Machine Learning
    Hamza, Amr
    Hammam, Farah
    Abouzeid, Medhat
    Ahmed, Mohammad Arsalan
    Dhou, Salam
    Aloul, Fadi
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 795 - 800
  • [38] Recent Challenges and Opportunities in Video Summarization With Machine Learning Algorithms
    Kadam, Payal
    Vora, Deepali
    Mishra, Sashikala
    Patil, Shruti
    Kotecha, Ketan
    Abraham, Ajith
    Gabralla, Lubna Abdelkareim
    IEEE ACCESS, 2022, 10 : 122762 - 122785
  • [39] Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 270 - 275
  • [40] Machine Learning Force Fields: Recent Advances and Remaining Challenges
    Poltavsky, Igor
    Tkatchenko, Alexandre
    JOURNAL OF PHYSICAL CHEMISTRY LETTERS, 2021, 12 (28): : 6551 - 6564