Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment

被引:13
作者
Asha, S. [1 ,3 ]
Shanmugapriya, D. [2 ]
Padmavathi, G. [1 ]
机构
[1] Avinashilingam Inst Home Sci & Higher Educ Women, Dept Comp Sci, Coimbatore 641043, Tamilnadu, India
[2] Avinashilingam Inst Home Sci & Higher Educ Women, Dept Informat Technol, Coimbatore 641043, Tamilnadu, India
[3] Avinashilingam Inst Home Sci & Higher Educ Women, Coimbatore, India
关键词
Anomaly detection; Cloud security; Malicious insider; Machine learning; Performance evaluation; Sampling techniques;
D O I
10.1016/j.compeleceng.2022.108519
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) techniques have currently been exploited for malicious insider threat (MIT) detection. The data variation between malicious and genuine user influences the ML model to misinterpret a malicious insider. Hence, the class imbalance problem (CIP) remains a chal-lenging one. Regardless of the CIP in MIT detection, past research has a significant shortfall in deploying diverse sampling methods. i.e., undersampling and oversampling approach. This study proposed a novel double-layer architecture for MIT detection. The initial layer involves inte-gration, transformation, and sampling system of data. In the sampling system, an efficient sam-pling approach is adopted to depreciate CIP among eight sampling techniques, depending on the performance of support vector machine (SVM) classifier. Nearmiss2 (NM-2) excels and is considered an optimal sampling technique. In the second layer, sampled data of NM-2 is employed in an anomalous MIT detection model using various anomaly detection techniques and evaluated with performance metrics. The main focus is to validate the solution for CIP in anomaly detection techniques with previous research. The proposed double-layer architecture with NM-2 and One-class SVM obtained recall and f-score of 100% and 78.72%. In contrast, it exhibits an accuracy of 82.46%, with a reasonable detection rate for MIT detection
引用
收藏
页数:15
相关论文
共 30 条
[1]   A new intelligent multilayer framework for insider threat detection [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Abidin, Z. Zainal ;
Abdulkareem, Karrar Hameed ;
Mohammed, Mazin Abed ;
Gupta, Deepak ;
Shankar, K. .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
[2]  
Al-Mhiqani MN, 2021, INT J ADV COMPUT SC, V12, P573
[3]   A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Zainal Abidin, Z. ;
Yassin, Warusia ;
Hassan, Aslinda ;
Abdulkareem, Karrar Hameed ;
Ali, Nabeel Salih ;
Yunos, Zahri .
APPLIED SCIENCES-BASEL, 2020, 10 (15)
[4]   An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques [J].
Al-Shehari, Taher ;
Alsowail, Rakan A. .
ENTROPY, 2021, 23 (10)
[5]   Scenario-Based Insider Threat Detection From Cyber Activities [J].
Chattopadhyay, Pratik ;
Wang, Lipo ;
Tan, Yap-Peng .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03) :660-675
[6]  
Diop A., 2019, Int. J. Comput. Inf. Eng., V13, P547
[7]  
Ekransystem, 5 REAL LIF DAT BREAC
[8]  
Elhassan T., 2016, GLOBAL J TECHNOL OPT, V1, DOI [10.4172/2229-8711.S1111, DOI 10.4172/2229-8711.S1111]
[9]   Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection [J].
Ferreira, Pedro ;
Le, Duc C. ;
Zincir-Heywood, Nur .
2019 15TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2019,
[10]  
Garba N, 2021, P INT C INNOVATIVE C, P1