Threats From Unintentional Insiders: An Assessment of an Organization's Readiness Using Machine Learning

被引:1
作者
Rahman, M. M. Hafizur [1 ]
Al Naeem, Mohammed [1 ]
Abubakar, Adamu [2 ]
机构
[1] King Faisal Univ, Dept Comp Networks & Commun, CCSIT, Al Hasa 31982, Saudi Arabia
[2] Int Islamic Univ Malaysia, Dept Comp Sci, KICT, Kuala Lumpur 53100, Malaysia
关键词
Computer security; Companies; Information technology; Machine learning; Software as a service; Social networking (online); Safety; Unintentional insiders; threats; network; attacks; data breaches; PREDICTION; NETWORKS;
D O I
10.1109/ACCESS.2022.3214819
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's organisations are facing a number of challenges, one of the most significant of which is ensuring the safety of their digital data. This is as a result of the fact that they are frequently faced with internal and external threats that can put the data they have been entrusted with in jeopardy of being compromised. As a result of this, this study investigates the dimension of threats associated to unintentional internal user of an organisation and utilises NARX to model and test a detection scheme associated to the menace. In addition, this study aims to provide a better understanding of the current state of the threat landscape. The data adopted for this research is primarily a "user activity logs" dataset from CERT (release version r4.2). From the data, the study conceptualized "Access", "Motivation", and "Action" to be the key dimensions influencing "insider", whereas "Intent", "+Action", "Method", and "knowledge" are the key dimension influencing "threats". Experimental analyses conducted by NARX within several numbers of partitions of the data point to a good detection capacity, with the greatest value of R2 coming in at 0.97. This indicates that NARX was able to detect the crucial dimension that was formulated for by the research to be the detections parameter of an inadvertent insider threat when operating under the best partition. In light of these findings, organisations can use the proposed approach to assess their preparedness for Insider attacks.
引用
收藏
页码:110294 / 110308
页数:15
相关论文
共 58 条
  • [11] Human factors in information security: The insider threat - Who can you trust these days?
    Colwill, Carl
    [J]. Information Security Technical Report, 2009, 14 (04): : 186 - 196
  • [12] Dastres R, 2021, INT J INF SCI COMPUT, P162
  • [13] Dhafer A. H, 2022, COMPUT INTEL NEUROSC, P1
  • [14] Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
    Erola, Arnau
    Agrafiotis, Ioannis
    Goldsmith, Michael
    Creese, Sadie
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [15] Feng WY, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P155, DOI 10.1109/ISI.2017.8004896
  • [16] Gaidarski I., 2021, Studies in Big Data, P381, DOI DOI 10.1007/978-3-030-65722-2_24
  • [17] A Hybrid Neural Network and Box-Jenkins Models for Time Series Forecasting
    Hadwan, Mohammad
    Al-Maqaleh, Basheer M.
    Al-Badani, Fuad N.
    Khan, Rehan Ullah
    Al-Hagery, Mohammed A.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 4829 - 4845
  • [18] Human factor, a critical weak point in the information security of an organization's Internet of things
    Hughes-Lartey, Kwesi
    Li, Meng
    Botchey, Francis E.
    Qin, Zhen
    [J]. HELIYON, 2021, 7 (03)
  • [19] Estimation of the Torques Produced by Human Upper Limb during Eating Activities Using NARX-NN
    Hussain, Zakia
    Azlan, Norsinnira Zainul
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [20] A survey of emerging threats in cybersecurity
    Jang-Jaccard, Julian
    Nepal, Surya
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (05) : 973 - 993