Research Opportunity of Insider Threat Detection based on Machine Learning Methods

被引:2
|
作者
Prajitno, Noer Tjahja Moekthi [1 ]
Hadiyanto, H. [2 ]
Rochim, Adian Fatchur [3 ]
机构
[1] Diponegoro Univ, Sch Postgrad Studies, Dept Informat Syst, Semarang, Indonesia
[2] Diponegoro Univ, Sch Postgradu Studies, Semarang, Indonesia
[3] Diponegoro Univ, Fac Engn, Dept Comp Engn, Semarang, Indonesia
来源
2023 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE IN INFORMATION AND COMMUNICATION, ICAIIC | 2023年
关键词
insider threat; machine learning; detection;
D O I
10.1109/ICAIIC57133.2023.10067010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Insider threats have been a known threat since a long time ago in the information technology field and many researchers tried to create novel methods to solve this threat. The purpose of this paper is to find research opportunities for insider threat detection. This was done by finding and reviewing papers related to insider threat detection. The papers reviewed were only the ones that utilized machine learning algorithms because they were the most common method used by researchers to detect malicious insiders. A systematic literature review by Kitchenham, which consisted of planning, selection, extraction, and execution, was employed as the methodology. The detection method was classified into three categories: combination, selection, and singular focus. Each category discussed and recommended a research direction to create a potentially better solution for insider threat problems.
引用
收藏
页码:292 / 296
页数:5
相关论文
共 50 条
  • [41] Insider Threat Detection in PRODIGAL
    Goldberg, Henry G.
    Young, William T.
    Reardon, Matthew G.
    Phillips, Brian J.
    Senator, Ted E.
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
  • [42] Machine Learning-Based Mobile Threat Monitoring and Detection
    Hatcher, William G.
    Maloney, David
    Yu, Wei
    2016 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2016, : 67 - 73
  • [43] Augmented Cognition Methods for Evaluating Serious Game Based Insider Cyber Threat Detection Training
    Andre, Terence S.
    Fidopiastis, Cali M.
    Ripley, Tiffany R.
    Oskorus, Anna L.
    Meyer, Ryan E.
    Snyder, Robert A.
    FOUNDATIONS OF AUGMENTED COGNITION: DIRECTING THE FUTURE OF ADAPTIVE SYSTEMS, 2011, 6780 : 395 - 403
  • [44] Cloud Insider Attack Detection Using Machine Learning
    Nathezhtha, T.
    Vaidehi, V.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 60 - 65
  • [45] Water-PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking
    Khalfaoui, Sameh
    Leneutre, Jean
    Villard, Arthur
    Gazeau, Ivan
    Ma, Jingxuan
    Danger, Jean-Luc
    Urien, Pascal
    2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
  • [46] Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning
    Le, Duc C.
    Zincir-Heywood, A. Nur
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 270 - 275
  • [47] Learning Correlation Graph and Anomalous Employee Behavior for Insider Threat Detection
    Pratibha
    Wang, Junshan
    Aggarwal, Saurabh
    Ji, Feng
    Tay, Wee Peng
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 595 - 601
  • [48] Dynamic Insider Threat Detection Based on Adaptable Genetic Programming
    Le, Duc C.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    2019 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2019), 2019, : 2579 - 2586
  • [49] An insider threat detection method based on business process mining
    Zhu, Taiming
    Guo, Yuanbo
    Ju, Ankang
    Ma, Jun
    Wang, Xuan
    International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
  • [50] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81