Threats From Unintentional Insiders: An Assessment of an Organization's Readiness Using Machine Learning

被引:1
作者
Rahman, M. M. Hafizur [1 ]
Al Naeem, Mohammed [1 ]
Abubakar, Adamu [2 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun, CCSIT, Al Hasa 31982, Saudi Arabia
[2] Int Islamic Univ Malaysia, Dept Comp Sci, KICT, Kuala Lumpur 53100, Malaysia
关键词
Computer security; Companies; Information technology; Machine learning; Software as a service; Social networking (online); Safety; Unintentional insiders; threats; network; attacks; data breaches; PREDICTION; NETWORKS;
D O I
10.1109/ACCESS.2022.3214819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's organisations are facing a number of challenges, one of the most significant of which is ensuring the safety of their digital data. This is as a result of the fact that they are frequently faced with internal and external threats that can put the data they have been entrusted with in jeopardy of being compromised. As a result of this, this study investigates the dimension of threats associated to unintentional internal user of an organisation and utilises NARX to model and test a detection scheme associated to the menace. In addition, this study aims to provide a better understanding of the current state of the threat landscape. The data adopted for this research is primarily a "user activity logs" dataset from CERT (release version r4.2). From the data, the study conceptualized "Access", "Motivation", and "Action" to be the key dimensions influencing "insider", whereas "Intent", "+Action", "Method", and "knowledge" are the key dimension influencing "threats". Experimental analyses conducted by NARX within several numbers of partitions of the data point to a good detection capacity, with the greatest value of R2 coming in at 0.97. This indicates that NARX was able to detect the crucial dimension that was formulated for by the research to be the detections parameter of an inadvertent insider threat when operating under the best partition. In light of these findings, organisations can use the proposed approach to assess their preparedness for Insider attacks.
引用
收藏
页码:110294 / 110308
页数:15
相关论文
共 58 条
  • [1] MODEL-INDEPENDENT PRICING WITH INSIDER INFORMATION: A SKOROKHOD EMBEDDING APPROACH
    Acciaio, Beatrice
    Cox, Alexander M. G.
    Huesmann, Martin
    [J]. ADVANCES IN APPLIED PROBABILITY, 2021, 53 (01) : 30 - 56
  • [2] Aditham S, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), P3625, DOI 10.1109/BigData.2016.7841027
  • [3] Al-Fatlawi QA., 2021, Webology, V18, P294, DOI [DOI 10.14704/WEB/V18SI02/WEB18073, 10.14704/web/v18si02/web18073]
  • [4] A new intelligent multilayer framework for insider threat detection
    Al-Mhiqani, Mohammed Nasser
    Ahmad, Rabiah
    Abidin, Z. Zainal
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Gupta, Deepak
    Shankar, K.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [5] Al-Mhiqani MN, 2021, INT J ADV COMPUT SC, V12, P573
  • [6] Alabdullah T. T. Y., 2021, Journal of Accounting Science, V5, P104, DOI [10.21070/jas.v5i2.1530, DOI 10.21070/JAS.V5I2.1530]
  • [7] Empirical Detection Techniques of Insider Threat Incidents
    Alsowail, Rakan A.
    Al-Shehari, Taher
    [J]. IEEE ACCESS, 2020, 8 : 78385 - 78402
  • [8] Fault detection and isolation of gas turbine using series-parallel NARX model
    Amirkhani, Saeed
    Tootchi, Amirreza
    Chaibakhsh, Ali
    [J]. ISA TRANSACTIONS, 2022, 120 : 205 - 221
  • [9] Deep Learning Based Vulnerability Detection: Are We There Yet?
    Chakraborty, Saikat
    Krishna, Rahul
    Ding, Yangruibo
    Ray, Baishakhi
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (09) : 3280 - 3296
  • [10] Chapman P., 2021, Computer Fraud Security, V2021, P8, DOI [DOI 10.1016/S1361-3723(21)00029-4, 10.1016/S1361-3723, DOI 10.1016/S1361-3723]