Insider threat detection using machine learning approach

B Bin Sarhan, N Altwaijry - Applied Sciences, 2022 - mdpi.com
Insider threats pose a critical challenge for securing computer networks and systems. They
are malicious activities by authorised users that can cause extensive damage, such as …

Itdbert: Temporal-semantic representation for insider threat detection

W Huang, H Zhu, C Li, Q Lv, Y Wang… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
The objective and universal nature of user behavior data make it the primary data for insider
threat detection. Existing solutions treat user behavior as atomic symbols and do not …

Image‐Based Insider Threat Detection via Geometric Transformation

D Li, L Yang, H Zhang, X Wang, L Ma… - Security and …, 2021 - Wiley Online Library
Insider threat detection has been a challenging task over decades; existing approaches
generally employ the traditional generative unsupervised learning methods to produce …

A hybrid sampling method for highly imbalanced and overlapped data classification with complex distribution

Y Liu, L Zhu, L Ding, H Sui, W Shang - Information Sciences, 2024 - Elsevier
Class imbalance and overlap coupling is the primary cause of performance degradation for
classifiers. Unfortunately, it always occurs. In this paper, we propose a hybrid sampling …

User Behavior Threat Detection Based on Adaptive Sliding Window GAN

X Tao, S Lu, F Zhao, R Lan, L Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
User behavior threat detection is important for the protection of network system security.
Traditional supervised modeling methods and unbalanced sample data lead to a high false …

Adversarial training for robust insider threat detection

RG Gayathri, A Sajjanhar… - 2022 International Joint …, 2022 - ieeexplore.ieee.org
Insider threat analysis techniques based on machine learning provide convenient and
effective automated detection of internally generated cyberattacks. When data are …

SeqA-ITD: User behavior sequence augmentation for insider threat detection at multiple time granularities

F Zhang, X Ma, W Huang - 2022 International Joint Conference …, 2022 - ieeexplore.ieee.org
Insider threat problems have occurred frequently and caused significant damage to
organizations. Many existing techniques represent the user activities recorded in audit data …

Evaluating the effectiveness of ensemble machine learning approaches for detecting healthcare insider threats

LA Koory - 2023 - search.proquest.com
Insider threats are a massive threat to healthcare organizations, causing the vast majority of
data breaches and resulting in severe negative consequences for a healthcare organization …

An Anomaly Detection Model Based on Pearson Correlation Coefficient and Gradient Booster Mechanism.

T Ding, H Sui - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
Anomaly detection aims to build a decision model that estimates the class of new data
based on historical sample features. However, the distance between samples in the feature …

Insider Threat Detection: Exploring User Event Behavior Analytics and Machine Learning in Security Reviews.

R Altuwaijiri, H AlShaher - Journal of Cybersecurity & …, 2024 - search.ebscohost.com
With the exponential increase in technology use, insider threats are also growing in scale
and importance, becoming one of the biggest challenges for government and corporate …