A new intelligent multilayer framework for insider threat detection

被引:45
作者
Al-Mhiqani, Mohammed Nasser [1 ]
Ahmad, Rabiah [1 ]
Abidin, Z. Zainal [1 ]
Abdulkareem, Karrar Hameed [2 ]
Mohammed, Mazin Abed [3 ]
Gupta, Deepak [4 ]
Shankar, K. [5 ]
机构
[1] Univ Teknikal Malaysia, Fac Informat & Commun Technol, Ctr Adv Comp Technol, Melaka, Malaysia
[2] Al Muthanna Univ, Coll Agr, Samawah, Al Muthanna Pro, Iraq
[3] Univ Anbar, Coll Comp Sci & Informat Technol, Anbar, Iraq
[4] Maharaja Agrasen Inst Technol, Sect 22, Delhi, India
[5] Alagappa Univ, Dept Comp Applicat, Karaikkudi, Tamil Nadu, India
关键词
Insider threat; Cybersecurity; Classification; Entropy; VIKOR; VIKOR METHOD; ENTROPY; SELECTION; SYSTEM;
D O I
10.1016/j.compeleceng.2021.107597
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In several earlier studies, machine learning (ML) has been widely used for building insider threat detection systems. However, the selection of the most appropriate ML classification model for insider threats detection remains a challenge. Despite the prominence of ML in the domain of insider threat detection, none of the previous works have utilized ML techniques for building a hybrid solution that can take advantage of the misuse and anomaly insider threat detection. In this study, a new multilayer framework has been proposed for insider threat detection. The first layer of the framework is used for selecting the best insider threat detection classification model among many based on the multi-criteria decision making techniques. The selection procedure has been developed based on the integration of the entropy-VIKOR methods. For the second layer, a hybrid insider threat detection method has been proposed, where the Misuse Insider Threat Detection (MITD) model has been created using the random forest algorithm. Subsequently, using the K-Nearest Neighbors algorithm, an anomaly insider threat detection algorithm has been developed. The proposed multilayer framework for insider threat detection has been evaluated by using the CERT r4.2 dataset. Results of the experiment demonstrate that the validity of the results produced by the selection framework is proven by the validation procedure obtained from previous research. The proposed hybrid detection method is observed to exhibit an overall accuracy of 99% and a false positive rate of 0.29% for known insider threats, whereas it exhibits 97% accuracy and 2.88% false-positive rate for unknown insider threats.
引用
收藏
页数:23
相关论文
共 42 条
[1]  
Al-Mhiqani M.N., 2018, International Journal of Information Systems and Management, V1, P343, DOI [10.1504/IJISAM.2018.094777, DOI 10.1504/IJISAM.2018.10014439]
[2]   A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations [J].
Al-Mhiqani, Mohammed Nasser ;
Ahmad, Rabiah ;
Zainal Abidin, Z. ;
Yassin, Warusia ;
Hassan, Aslinda ;
Abdulkareem, Karrar Hameed ;
Ali, Nabeel Salih ;
Yunos, Zahri .
APPLIED SCIENCES-BASEL, 2020, 10 (15)
[3]   Multiclass Benchmarking Framework for Automated Acute Leukaemia Detection and Classification Based on BWM and Group-VIKOR [J].
Alsalem, M. A. ;
Zaidan, A. A. ;
Zaidan, B. B. ;
Albahri, O. S. ;
Alamoodi, A. H. ;
Albahri, A. S. ;
Mohsin, A. H. ;
Mohammed, K. I. .
JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (07)
[4]   Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects [J].
Alsalem, M. A. ;
Zaidan, A. A. ;
Zaidan, B. B. ;
Hashim, M. ;
Albahri, O. S. ;
Albahri, A. S. ;
Hadi, Ali ;
Mohammed, K. I. .
JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (11)
[5]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[6]  
[Anonymous], 2018, INSIDER THREAT 2018
[7]  
[Anonymous], 2020, 2020 insider threat report
[8]   An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications [J].
Beaver, Justin M. ;
Borges-Hink, Raymond C. ;
Buckner, Mark. A. .
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, :54-59
[9]  
Bisong E., 2019, GOOGLE COLABORATORY
[10]   Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams [J].
Bose, Brock ;
Avasarala, Bhargav ;
Tirthapura, Srikanta ;
Chung, Yung-Yu ;
Steiner, Donald .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :471-482