Abstract
INTRODUCTION: Insider threats are a major issue for cyber security. In contrast to external attackers, insiders have more privileges and authorized access to data and resources, which can cause an organization great harm. To completely understand an insider's activities throughout the organization, a more sophisticated method is needed.
OBJECTIVES: Based on an organization's login activity, this study proposes a novel conceptual method for insider threat detection. Behavioural activities such as HTTP, Email and Login details are collected to create a dataset which is further processed for pre-processing using data transformation and Trimmed Score Regression (TSR).
METHODS: These pre-data are given to the feature extraction process using Deep Feature Synthesis (DFS) extraction. The extracted data are fed to Physics Informed Neural Networks (PINN) for insider threat detection.
RESULTS: The prediction process of PINN was improved through optimally choosing parameters such as learning rate and weight using Hunter-prey Optimization (HPO). The proposed model offers 68% detection rate, 98.4% accuracy, 5% FDR, 95% F1_score and 0.7005 sec execution time.
CONCLUSION: Observed outcomes are compared to other traditional approaches of validation. The contrast with traditional approaches shows that the proposed model provides better outcomes than in traditional models and is therefore a good fit for real-time threat prediction.
Publisher
European Alliance for Innovation n.o.
Reference35 articles.
1. [1] Yuan Yuan S, Wu X. Deep learning for insider threat detection: Review, challenges and opportunities. Computers & Security. 2021;104:102221.
2. [2] Jeong M, Zo H. Preventing insider threats to enhance organizational security: The role of opportunity-reducing techniques. Telematics and Informatics. 2021;63:101670.
3. [3] Yu K, Tan L, Mumtaz S, Al-Rubaye S, Al-Dulaimi A, Bashir AK, Khan FA. Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Communications Magazine. 2021;59(10):76-82.
4. [4] Robayo TA. The Enemy Within: A Framework for Understanding the Lifecycle of the Malicious Insider Threat to Information Systems (Doctoral dissertation, Saint Leo University).
5. [5] Saxena N, Hayes E, Bertino E, Ojo P, Choo KK, Burnap P. Impact and key challenges of insider threats on organizations and critical businesses. Electronics. 2020;9(9):1460.