Abstract
In today’s competitive world, business security is essential. To secure the business processes and confidential data, organizations have to protect the system by implementing new policies and techniques to detect the threats and control it. Threats for cybersecurity are classified into two types, outsider and insider threats. Both threats are very harmful to the organization. These may convert into a severe attack on the systems upon future. Outsider threats have to take more effort to break the security system. But inside users are those who are privileged to access the system within the organization. As data form is digital, it is straightforward to transfer from one to another. Data leakage, theft, and sharing are easy for insiders. Therefore, there is a need to research in this domain. In this proposed paper, a study of insider threat detection based on the anomalous behavior of the user for cybersecurity is presented. The data processing and anomaly detection algorithms are performed for insider threat detection by researchers. This research paper presented a study on insider threat detection based on the anomalous behavior of the user for cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Almehmadi A, El-Khatib K (2017) On the Possibility of insider threat prevention using intent-based access control (IBAC). IEEE Syst J 11:373–384
Bao H, Lu R, Li B, Deng R (2016) BLITHE: behavior rule-based insider threat detection for smart grid. IEEE Internet Things J 3:190–205
Basu S, Victoria Chua YH, Wah Lee M, Lim WG, Maszczyk T, Guo Z, Dauwels J (2018) Towards a data-driven behavioral approach to prediction of insider-threat. In: 2018 IEEE international conference on big data (big data. IEEE, Seattle, WA, USA), pp 4994–5001. https://doi.org/10.1109/BigData.2018.8622529
Chattopadhyay P, Wang L, Tan Y-P (2018) Scenario-based insider threat detection from cyber activities. IEEE Trans Comput Soc Syst 5:660–675
Choi J, Bang J, Kim L, Ahn M, Kwon T (2017) Location-based key management strong against insider threats in wireless sensor networks. IEEE Syst J 11:494–502
Garg S, Kaur K, Kumar N, Rodrigues JJPC (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans Multimedia 21:566–578. https://doi.org/10.1109/TMM.2019.2893549
Hall AJ, Pitropakis N, Buchanan WJ, Moradpoor N (2018) Predicting malicious insider threat scenarios using organizational data and a heterogeneous stack-classifier. In: 2018 IEEE international conference on big data (big data). IEEE, Seattle, WA, USA, pp 5034–5039
Huang X, Lu Y, Li D, Ma M (2018) A novel mechanism for fast detection of transformed data leakage. IEEE Access 6:35926–35936
Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 eighth IEEE international conference on data mining. IEEE, Pisa, Italy, pp 413–422
Liu L, De Vel O, Chen C, Zhang J, Xiang Y (2018) Anomaly-based insider threat detection using deep autoencoders. In: 2018 IEEE international conference on data mining workshops (ICDMW). IEEE, Singapore, Singapore, pp 39–48
Liu L, De Vel O, Han Q-L, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Commun Surv Tutor 20:1397–1417
Santos E, Nguyen H, Yu F, Kim KJ, Li D, Wilkinson JT, Olson A, Russell J, Clark B (2012) Intelligence analyses and the insider threat. IEEE Trans Syst Man Cybern. - Part Syst Hum 42:331–347. https://doi.org/10.1109/TSMCA.2011.2162500
Saxena N, Choi BJ, Lu R (2016) Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans Inf Forensics Secur 11:907–921
Smith TD (2018) Countering inside threat actors in algorithm-based media. In: 2018 IEEE international conference on big data (big data). IEEE, Seattle, WA, USA, pp 4453–4459. https://doi.org/10.1109/BigData.2018.8621940
Walker-Roberts S, Hammoudeh M, Dehghantanha A (2018) A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6:25167–25177
Yaseen Q, Alabdulrazzaq A, Albalas F (2019) A framework for insider collusion threat prediction and mitigation in relational databases. In: 2019 IEEE 9th annual computing and communication workshop and conference (CCWC. IEEE, Las Vegas, NV, USA), pp 0721–0727. https://doi.org/10.1109/CCWC.2019.8666582
Acknowledgments
I wish to acknowledge the Software Engineering Institute of Carnegie Mellon University and Exact Data LLC for making available data for the research study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sav, U., Magar, G. (2021). Insider Threat Detection Based on Anomalous Behavior of User for Cybersecurity. In: Jat, D.S., Shukla, S., Unal, A., Mishra, D.K. (eds) Data Science and Security. Lecture Notes in Networks and Systems, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-15-5309-7_3
Download citation
DOI: https://doi.org/10.1007/978-981-15-5309-7_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5308-0
Online ISBN: 978-981-15-5309-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)