An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection

被引:7
|
作者
Saminathan, Karthikeyan [1 ]
Mulka, Sai Tharun Reddy [2 ]
Damodharan, Sangeetha [3 ]
Maheswar, Rajagopal [4 ]
Lorincz, Josip [5 ]
机构
[1] KPR Inst Engn & Technol, Comp Sci & Engn AIML, Coimbatore 641407, Tamil Nadu, India
[2] VIT AP Univ, Comp Sci & Engn, Amaravati 522241, Andhra Pradesh, India
[3] Anna Univ, Madras Inst Technol, Informat Technol, Chennai, Tamil Nadu, India
[4] KPR Inst Engn & Technol, Ctr IoT & AI CITI, Dept ECE, Coimbatore 641407, Tamil Nadu, India
[5] Univ Split, Fac Elect Engn Mech Engn & Naval Architecture FESB, Rudjera Boskovca 32, Split 21000, Croatia
关键词
insider; threat; detection; autoencoder; artificial neural network; cyber security;
D O I
10.3390/fi15120373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyber security is a more concerning issue and is now incorporated into almost every smart gadget and has become a prerequisite in every software product and service. There are various mitigations for external cyber security attacks, but hardly any for insider security threats, as they are difficult to detect and mitigate. Thus, insider cyber security threat detection has become a serious concern in recent years. Hence, this paper proposes an unsupervised deep learning approach that employs an artificial neural network (ANN)-based autoencoder to detect anomalies in an insider cyber security attack scenario. The proposed approach analyzes the behavior of the patterns of users and machines for anomalies and sends an alert based on a set security threshold. The threshold value set for security detection is calculated based on reconstruction errors that are obtained through testing the normal data. When the proposed model reconstructs the user behavior without generating sufficient reconstruction errors, i.e., no more than the threshold, the user is flagged as normal; otherwise, it is flagged as a security intruder. The proposed approach performed well, with an accuracy of 94.3% for security threat detection, a false positive rate of 11.1%, and a precision of 89.1%. From the obtained experimental results, it was found that the proposed method for insider security threat detection outperforms the existing methods in terms of performance reliability, due to implementation of ANN-based autoencoder which uses a larger number of features in the process of security threat detection.
引用
收藏
页数:29
相关论文
共 50 条
  • [41] Applications of artificial intelligence in cyber security
    Vaishnav, Pragya
    Raja, Linesh
    Singh, Poonam
    Tandel, Swapnali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1367 - 1375
  • [42] Artificial Intelligence Cyber Security Strategy
    Feng, Xiaohua
    Feng, Yunzhong
    Dawam, Edward Swarlat
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 328 - 333
  • [43] Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider
    Zhurin, Sergey Igorevich
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) : 251 - 269
  • [44] Anomaly Detection on Medical Images using Autoencoder and Convolutional Neural Network
    Siddalingappa, Rashmi
    Kanagaraj, Sekar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 148 - 156
  • [45] Artificial Neural Network for the Left Ventricle Detection
    Imanov, Elbrus
    Ibra, Anwar A.
    10TH INTERNATIONAL CONFERENCE ON THEORY AND APPLICATION OF SOFT COMPUTING, COMPUTING WITH WORDS AND PERCEPTIONS - ICSCCW-2019, 2020, 1095 : 487 - 494
  • [46] Engaging Students in Threat Thinking with the Cyber Security Cinema
    Maguire, Joseph
    English, Rosanne
    Draper, Steve
    PROCEEDINGS OF THE 7TH CONFERENCE ON COMPUTING EDUCATION PRACTICE, CEP 2023, 2023, : 13 - 16
  • [47] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [48] Benchmarking Genetic Programming in Dynamic Insider Threat Detection
    Le, Duc C.
    Heywood, Malcolm, I
    Zincir-Heywood, Nur
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 385 - 386
  • [49] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [50] Benchmarking Evolutionary Computation Approaches to Insider Threat Detection
    Le, Duc C.
    Khanchi, Sara
    Zincir-Heywood, A. Nur
    Heywood, Malcolm, I
    GECCO'18: PROCEEDINGS OF THE 2018 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2018, : 1286 - 1293