Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm

被引:7
作者
Al-Shehari, Taher Ali [1 ]
Rosaci, Domenico [2 ]
Al-Razgan, Muna [3 ]
Alfakih, Taha [4 ]
Kadrie, Mohammed [1 ]
Afzal, Hammad [5 ]
Nawaz, Raheel [6 ]
机构
[1] King Saud Univ, Dept Self Dev Skill, Common Year Deanship 1, Riyadh 11362, Saudi Arabia
[2] Mediterranea Univ Reggio Calabria, Dept Informat Engn Infrastruct & Sustainable Energ, I-89122 Reggio Di Calabria, Italy
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11345, Saudi Arabia
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
[5] Natl Univ Sci & Technol, Islamabad 44000, Pakistan
[6] Staffordshire Univ, Execut Grp, Stoke On Trent ST4 2DE, England
关键词
Machine learning; insider threat detection; local outlier factor algorithm; data imbalance addressing;
D O I
10.1109/ACCESS.2024.3373694
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's interconnected world, cybersecurity has emerged as a critical domain for ensuring the integrity, confidentiality, and availability of digital assets. Within this sphere, insider threats represent a unique and particularly insidious class of security risks, originating not from external hackers but from within the organization itself. These threats are perpetrated by individuals with inside information concerning the organization's security practices, data, and computer systems. Traditional security measures like firewalls, intrusion detection systems, and antivirus software are often inadequate for tackling insider threats effectively, owing to their focus on external threats. This inadequacy underscores the urgent need for the development and implementation of more sophisticated, targeted detection techniques for insider threats. In response to this challenge, our research introduces an innovative approach that employs the Density-Based Local Outlier Factor (DBLOF) algorithm, fine-tuned to specifically tackle the challenges posed by the imbalanced nature of the CERT r4.2 insider threat dataset. This dataset is characterized by a highly skewed distribution, with a significant majority of benign instances and only a minimal proportion of malicious activities. Conventional detection algorithms often fail to effectively identify these rare but dangerous instances, leading to a high rate of false negatives. Our methodology capitalizes on the algorithm's ability to focus on the local density deviation of data points, thereby enabling the precise identification of outliers that are indicative of potential insider threats. Through rigorous testing and validation processes, we have achieved outstanding results, with an of F-score 98%. These remarkable outcomes not only affirm the effectiveness of the DBLOF algorithm as a powerful tool for combating insider threats but also contribute valuable insights to the broader academic and professional discourse on cybersecurity. Importantly, our findings have practical implications, offering organizations actionable recommendations for boosting their internal security mechanisms against the complex and evolving landscape of insider threats.
引用
收藏
页码:34820 / 34834
页数:15
相关论文
共 36 条
[1]  
Al-Mhiqani MN, 2021, INT J ADV COMPUT SC, V12, P573
[2]   Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection [J].
Al-Shehari, Taher ;
Alsowail, Rakan A. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (03) :611-629
[3]   An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques [J].
Al-Shehari, Taher ;
Alsowail, Rakan A. .
ENTROPY, 2021, 23 (10)
[4]   Empirical Detection Techniques of Insider Threat Incidents [J].
Alsowail, Rakan A. ;
Al-Shehari, Taher .
IEEE ACCESS, 2020, 8 :78385-78402
[5]   Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data [J].
Azaria, Amos ;
Richardson, Ariella ;
Kraus, Sarit ;
Subrahmanian, V. S. .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2014, 1 (02) :135-155
[6]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[7]  
CERT and ExactData LLC, 2020, INS THREAT TEST DAT
[8]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[9]   Multi-Domain Information Fusion for Insider Threat Detection [J].
Eldardiry, Hoda ;
Bart, Evgeniy ;
Liu, Juan ;
Hanley, John ;
Price, Bob ;
Brdiczka, Oliver .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :45-51
[10]  
Ertoz L., 2004, Next Generation of Data Mining