Research Opportunity of Insider Threat Detection based on Machine Learning Methods

被引:2
|
作者
Prajitno, Noer Tjahja Moekthi [1 ]
Hadiyanto, H. [2 ]
Rochim, Adian Fatchur [3 ]
机构
[1] Diponegoro Univ, Sch Postgrad Studies, Dept Informat Syst, Semarang, Indonesia
[2] Diponegoro Univ, Sch Postgradu Studies, Semarang, Indonesia
[3] Diponegoro Univ, Fac Engn, Dept Comp Engn, Semarang, Indonesia
来源
2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC | 2023年
关键词
insider threat; machine learning; detection;
D O I
10.1109/ICAIIC57133.2023.10067010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats have been a known threat since a long time ago in the information technology field and many researchers tried to create novel methods to solve this threat. The purpose of this paper is to find research opportunities for insider threat detection. This was done by finding and reviewing papers related to insider threat detection. The papers reviewed were only the ones that utilized machine learning algorithms because they were the most common method used by researchers to detect malicious insiders. A systematic literature review by Kitchenham, which consisted of planning, selection, extraction, and execution, was employed as the methodology. The detection method was classified into three categories: combination, selection, and singular focus. Each category discussed and recommended a research direction to create a potentially better solution for insider threat problems.
引用
收藏
页码:292 / 296
页数:5
相关论文
共 50 条
  • [31] A Trust Aware Unsupervised Learning Approach for Insider Threat Detection
    Aldairi, Maryam
    Karimi, Leila
    Joshi, James
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 89 - 98
  • [32] Role-based Log Analysis Applying Deep Learning for Insider Threat Detection
    Zhang, Dongxue
    Zheng, Yang
    Wen, Yu
    Xu, Yujue
    Wang, Jingchuo
    Yu, Yang
    Meng, Dan
    PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, : 18 - 20
  • [33] Deep learning for insider threat detection: Review, challenges and opportunities
    Yuan, Shuhan
    Wu, Xintao
    COMPUTERS & SECURITY, 2021, 104
  • [34] Supervised Learning for Insider Threat Detection Using Stream Mining
    Parveen, Pallabi
    Weger, Zackary R.
    Thuraisingham, Bhavani
    Hamlen, Kevin
    Khan, Latifur
    2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011), 2011, : 1032 - 1039
  • [35] An Effective Insider Threat Detection Apporoach Based on BPNN
    Tao, Xiaoling
    Liu, Runrong
    Fu, Lianyou
    Qiu, Qiqi
    Yu, Yuelin
    Zhang, Haijing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 231 - 243
  • [36] Graph-based insider threat detection: A survey
    Gong, Yiru
    Cui, Susu
    Liu, Song
    Jiang, Bo
    Dong, Cong
    Lu, Zhigang
    COMPUTER NETWORKS, 2024, 254
  • [37] A Graph Based Framework for Malicious Insider Threat Detection
    Gamachchi, Anagi
    Sun, Li
    Boztas, Serdar
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2638 - 2647
  • [38] Insider Threat Detection: A Review
    Manoharan, Phavithra
    Yin, Jiao
    Wang, Him
    Zhang, Yanchun
    Ye, Wenjie
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 147 - 153
  • [39] A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods (vol 12, pg 30907, 2024)
    Alzaabi, Fatima Rashed
    Mehmood, Abid
    IEEE ACCESS, 2024, 12 : 192827 - 192827
  • [40] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):