Research Opportunity of Insider Threat Detection based on Machine Learning Methods

被引:2
|
作者
Prajitno, Noer Tjahja Moekthi [1 ]
Hadiyanto, H. [2 ]
Rochim, Adian Fatchur [3 ]
机构
[1] Diponegoro Univ, Sch Postgrad Studies, Dept Informat Syst, Semarang, Indonesia
[2] Diponegoro Univ, Sch Postgradu Studies, Semarang, Indonesia
[3] Diponegoro Univ, Fac Engn, Dept Comp Engn, Semarang, Indonesia
来源
2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC | 2023年
关键词
insider threat; machine learning; detection;
D O I
10.1109/ICAIIC57133.2023.10067010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats have been a known threat since a long time ago in the information technology field and many researchers tried to create novel methods to solve this threat. The purpose of this paper is to find research opportunities for insider threat detection. This was done by finding and reviewing papers related to insider threat detection. The papers reviewed were only the ones that utilized machine learning algorithms because they were the most common method used by researchers to detect malicious insiders. A systematic literature review by Kitchenham, which consisted of planning, selection, extraction, and execution, was employed as the methodology. The detection method was classified into three categories: combination, selection, and singular focus. Each category discussed and recommended a research direction to create a potentially better solution for insider threat problems.
引用
收藏
页码:292 / 296
页数:5
相关论文
共 50 条
  • [21] Distance Measurement Methods for Improved Insider Threat Detection
    Lo, Owen
    Buchanan, William J.
    Griffiths, Paul
    Macfarlane, Richard
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [22] Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection
    Kumar, Sanjay
    Viinikainen, Ari
    Hamalainen, Timo
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 261 - 268
  • [23] A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
    Al-Mhiqani, Mohammed Nasser
    Ahmad, Rabiah
    Zainal Abidin, Z.
    Yassin, Warusia
    Hassan, Aslinda
    Abdulkareem, Karrar Hameed
    Ali, Nabeel Salih
    Yunos, Zahri
    APPLIED SCIENCES-BASEL, 2020, 10 (15):
  • [24] Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection
    Tian, Zhihong
    Shi, Wei
    Tan, Zhiyuan
    Qiu, Jing
    Sun, Yanbin
    Jiang, Feng
    Liu, Yan
    MOBILE NETWORKS & APPLICATIONS, 2020, 29 (5): : 1680 - 1689
  • [25] User Behaviour based Insider Threat Detection using a Hybrid Learning Approach
    Singh M.
    Mehtre B.M.
    Sangeetha S.
    Govindaraju V.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (04) : 4573 - 4593
  • [26] Deep learning-based authentication for insider threat detection in critical infrastructure
    Budzys, Arnoldas
    Kurasova, Olga
    Medvedev, Viktor
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (10)
  • [27] Comparative research on network intrusion detection methods based on machine learning
    Zhang, Chunying
    Jia, Donghao
    Wang, Liya
    Wang, Wenjie
    Liu, Fengchun
    Yang, Aimin
    COMPUTERS & SECURITY, 2022, 121
  • [28] A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things
    Chowdhury, Morshed
    Ray, Biplob
    Chowdhury, Sujan
    Rajasegarar, Sutharshan
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (04):
  • [29] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [30] Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection
    Wang, Jiarong
    Cai, Lijun
    Yu, Aimin
    Meng, Dan
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 947 - 954