Skip to main content

Insider Threat Detection Based on Anomalous Behavior of User for Cybersecurity

  • Conference paper
  • First Online:
Data Science and Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 132))

Abstract

In today’s competitive world, business security is essential. To secure the business processes and confidential data, organizations have to protect the system by implementing new policies and techniques to detect the threats and control it. Threats for cybersecurity are classified into two types, outsider and insider threats. Both threats are very harmful to the organization. These may convert into a severe attack on the systems upon future. Outsider threats have to take more effort to break the security system. But inside users are those who are privileged to access the system within the organization. As data form is digital, it is straightforward to transfer from one to another. Data leakage, theft, and sharing are easy for insiders. Therefore, there is a need to research in this domain. In this proposed paper, a study of insider threat detection based on the anomalous behavior of the user for cybersecurity is presented. The data processing and anomaly detection algorithms are performed for insider threat detection by researchers. This research paper presented a study on insider threat detection based on the anomalous behavior of the user for cybersecurity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Almehmadi A, El-Khatib K (2017) On the Possibility of insider threat prevention using intent-based access control (IBAC). IEEE Syst J 11:373–384

    Article  Google Scholar 

  2. Bao H, Lu R, Li B, Deng R (2016) BLITHE: behavior rule-based insider threat detection for smart grid. IEEE Internet Things J 3:190–205

    Article  Google Scholar 

  3. Basu S, Victoria Chua YH, Wah Lee M, Lim WG, Maszczyk T, Guo Z, Dauwels J (2018) Towards a data-driven behavioral approach to prediction of insider-threat. In: 2018 IEEE international conference on big data (big data. IEEE, Seattle, WA, USA), pp 4994–5001. https://doi.org/10.1109/BigData.2018.8622529

  4. Chattopadhyay P, Wang L, Tan Y-P (2018) Scenario-based insider threat detection from cyber activities. IEEE Trans Comput Soc Syst 5:660–675

    Article  Google Scholar 

  5. Choi J, Bang J, Kim L, Ahn M, Kwon T (2017) Location-based key management strong against insider threats in wireless sensor networks. IEEE Syst J 11:494–502

    Article  Google Scholar 

  6. Garg S, Kaur K, Kumar N, Rodrigues JJPC (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans Multimedia 21:566–578. https://doi.org/10.1109/TMM.2019.2893549

    Article  Google Scholar 

  7. Hall AJ, Pitropakis N, Buchanan WJ, Moradpoor N (2018) Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier. In: 2018 IEEE international conference on big data (big data). IEEE, Seattle, WA, USA, pp 5034–5039

    Google Scholar 

  8. Huang X, Lu Y, Li D, Ma M (2018) A novel mechanism for fast detection of transformed data leakage. IEEE Access 6:35926–35936

    Article  Google Scholar 

  9. Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 eighth IEEE international conference on data mining. IEEE, Pisa, Italy, pp 413–422

    Google Scholar 

  10. Liu L, De Vel O, Chen C, Zhang J, Xiang Y (2018) Anomaly-based insider threat detection using deep autoencoders. In: 2018 IEEE international conference on data mining workshops (ICDMW). IEEE, Singapore, Singapore, pp 39–48

    Google Scholar 

  11. Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Commun Surv Tutor 20:1397–1417

    Article  Google Scholar 

  12. Santos E, Nguyen H, Yu F, Kim KJ, Li D, Wilkinson JT, Olson A, Russell J, Clark B (2012) Intelligence analyses and the insider threat. IEEE Trans Syst Man Cybern. - Part Syst Hum 42:331–347. https://doi.org/10.1109/TSMCA.2011.2162500

  13. Saxena N, Choi BJ, Lu R (2016) Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans Inf Forensics Secur 11:907–921

    Article  Google Scholar 

  14. Smith TD (2018) Countering inside threat actors in algorithm-based media. In: 2018 IEEE international conference on big data (big data). IEEE, Seattle, WA, USA, pp 4453–4459. https://doi.org/10.1109/BigData.2018.8621940

  15. Walker-Roberts S, Hammoudeh M, Dehghantanha A (2018) A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6:25167–25177

    Article  Google Scholar 

  16. Yaseen Q, Alabdulrazzaq A, Albalas F (2019) A framework for insider collusion threat prediction and mitigation in relational databases. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC. IEEE, Las Vegas, NV, USA), pp 0721–0727. https://doi.org/10.1109/CCWC.2019.8666582

Download references

Acknowledgments

I wish to acknowledge the Software Engineering Institute of Carnegie Mellon University and Exact Data LLC for making available data for the research study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ujwala Sav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sav, U., Magar, G. (2021). Insider Threat Detection Based on Anomalous Behavior of User for Cybersecurity. In: Jat, D.S., Shukla, S., Unal, A., Mishra, D.K. (eds) Data Science and Security. Lecture Notes in Networks and Systems, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-15-5309-7_3

Download citation

Publish with us

Policies and ethics