An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection

被引:7
|
作者
Saminathan, Karthikeyan [1 ]
Mulka, Sai Tharun Reddy [2 ]
Damodharan, Sangeetha [3 ]
Maheswar, Rajagopal [4 ]
Lorincz, Josip [5 ]
机构
[1] KPR Inst Engn & Technol, Comp Sci & Engn AIML, Coimbatore 641407, Tamil Nadu, India
[2] VIT AP Univ, Comp Sci & Engn, Amaravati 522241, Andhra Pradesh, India
[3] Anna Univ, Madras Inst Technol, Informat Technol, Chennai, Tamil Nadu, India
[4] KPR Inst Engn & Technol, Ctr IoT & AI CITI, Dept ECE, Coimbatore 641407, Tamil Nadu, India
[5] Univ Split, Fac Elect Engn Mech Engn & Naval Architecture FESB, Rudjera Boskovca 32, Split 21000, Croatia
关键词
insider; threat; detection; autoencoder; artificial neural network; cyber security;
D O I
10.3390/fi15120373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyber security is a more concerning issue and is now incorporated into almost every smart gadget and has become a prerequisite in every software product and service. There are various mitigations for external cyber security attacks, but hardly any for insider security threats, as they are difficult to detect and mitigate. Thus, insider cyber security threat detection has become a serious concern in recent years. Hence, this paper proposes an unsupervised deep learning approach that employs an artificial neural network (ANN)-based autoencoder to detect anomalies in an insider cyber security attack scenario. The proposed approach analyzes the behavior of the patterns of users and machines for anomalies and sends an alert based on a set security threshold. The threshold value set for security detection is calculated based on reconstruction errors that are obtained through testing the normal data. When the proposed model reconstructs the user behavior without generating sufficient reconstruction errors, i.e., no more than the threshold, the user is flagged as normal; otherwise, it is flagged as a security intruder. The proposed approach performed well, with an accuracy of 94.3% for security threat detection, a false positive rate of 11.1%, and a precision of 89.1%. From the obtained experimental results, it was found that the proposed method for insider security threat detection outperforms the existing methods in terms of performance reliability, due to implementation of ANN-based autoencoder which uses a larger number of features in the process of security threat detection.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] Contrastive Learning for Insider Threat Detection
    Vinay, M. S.
    Yuan, Shuhan
    Wu, Xintao
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
  • [22] Network anomaly detection using Deep Autoencoder and parallel Artificial Bee Colony algorithm-trained neural network
    Hacılar, Hilal
    Dedeturk, Bilge Kagan
    Bakir-Gungor, Burcu
    Gungor, Vehbi Cagri
    PeerJ Computer Science, 2024, 10
  • [23] Network anomaly detection using Deep Autoencoder and parallel Artificial Bee Colony algorithm-trained neural network
    Hacilar, Hilal
    Dedeturk, Bilge Kagan
    Bakir-Gungor, Burcu
    Gungor, Vehbi Cagri
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [24] Neural Network Models in Big Data Analytics and Cyber Security
    Ghimes, Ana-Maria
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [25] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [26] An Autoencoder Based Insider Attack Detection in Imbalanced Data
    Xu, Shuting
    Lai, Shuhua
    Qiu, Manying
    Li, Yongjian
    AMCIS 2020 PROCEEDINGS, 2020,
  • [27] A Threat to Vehicular Cyber Security and the Urgency for Correction
    Rizvi, Syed
    Willet, Jonathan
    Perino, Donte
    Marasco, Seth
    Condo, Chandler
    COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS, 2017, 114 : 100 - 105
  • [28] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67
  • [29] Applications and Security Risks of Artificial Intelligence for Cyber Security in Digital Environment
    Aurucci, Paola
    INTELLIGENT ENVIRONMENTS 2018, 2018, 23 : 308 - 317
  • [30] Cyber Security Threat Modeling of A Telesurgery System
    Al Asif, Md Rashid
    Khondoker, Rahamatullah
    2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,