Javascript must be enabled to continue!
Enhancing Intrusion Detection Systems: A Unified Framework Leveraging User Personality Behavior Analysis to Detect Insider Threats and Social Engineering Attacks through Deep Learning
View through CrossRef
Insider threats and social engineering attacks (SEAs) pose significant challenges in cybersecurity (CS), often resulting in data breaches and substantial financial losses. Insider actions, whether intentional or unintentional, can lead to severe costs for organizations. Despite the implementation of multiple detection strategies, human errors continue to play a significant role in financial losses and the increased risk of data breaches. Traditional intrusion detection systems (IDS) focus primarily on network and host activities but tend to overlook the critical role of human behavior, which limits their ability to detect insider threats and SEAs effectively. This article proposes a novel and unified detection approach that integrates network detection, host-based detection, and user psychological behavior analysis to enhance IDS performance. The primary objective of this research is to improve the detection capabilities of conventional IDS by incorporating psychometric analysis of user behavior. Using psychological insights of humans and correlating them with cyber threat vulnerabilities, this approach aims to reduce false alarms and increase the accuracy of threat detection. To achieve this, we utilize deep neural networks (DNNs). Our unified detection framework integrates datasets, including threat intelligence and psychometric dataset, to enhance the identification of malicious activities and improve the overall detection performance. We evaluate the effectiveness of our model using accuracy, precision, recall, and F1-score metrics, then comparing our results to those of existing detection models. Our findings demonstrate promising results, highlighting the importance of incorporating psychological factors into threat detection systems to better protect organizational resources from evolving cyber risks. By integrating user behavior analysis with established detection methods, we strengthen the capabilities of traditional IDS. However, given the ever-growing complexity of modern cyber threats, continued innovation in threat mitigation strategies is essential.
Title: Enhancing Intrusion Detection Systems: A Unified Framework Leveraging User Personality Behavior Analysis to Detect Insider Threats and Social Engineering Attacks through Deep Learning
Description:
Insider threats and social engineering attacks (SEAs) pose significant challenges in cybersecurity (CS), often resulting in data breaches and substantial financial losses.
Insider actions, whether intentional or unintentional, can lead to severe costs for organizations.
Despite the implementation of multiple detection strategies, human errors continue to play a significant role in financial losses and the increased risk of data breaches.
Traditional intrusion detection systems (IDS) focus primarily on network and host activities but tend to overlook the critical role of human behavior, which limits their ability to detect insider threats and SEAs effectively.
This article proposes a novel and unified detection approach that integrates network detection, host-based detection, and user psychological behavior analysis to enhance IDS performance.
The primary objective of this research is to improve the detection capabilities of conventional IDS by incorporating psychometric analysis of user behavior.
Using psychological insights of humans and correlating them with cyber threat vulnerabilities, this approach aims to reduce false alarms and increase the accuracy of threat detection.
To achieve this, we utilize deep neural networks (DNNs).
Our unified detection framework integrates datasets, including threat intelligence and psychometric dataset, to enhance the identification of malicious activities and improve the overall detection performance.
We evaluate the effectiveness of our model using accuracy, precision, recall, and F1-score metrics, then comparing our results to those of existing detection models.
Our findings demonstrate promising results, highlighting the importance of incorporating psychological factors into threat detection systems to better protect organizational resources from evolving cyber risks.
By integrating user behavior analysis with established detection methods, we strengthen the capabilities of traditional IDS.
However, given the ever-growing complexity of modern cyber threats, continued innovation in threat mitigation strategies is essential.
Related Results
Current Detection Methods for Insider Threats and Social Engineering Attacks: Enhancements and Analysis Using Deep Learning
Current Detection Methods for Insider Threats and Social Engineering Attacks: Enhancements and Analysis Using Deep Learning
Despite advancements in technology, insider threats and social engineering attacks continue to pose significant challenges. Current threat detection methods often fail to effectivel...
DAMPAK TEKNOLOGI TERHADAP PROSES BELAJAR MENGAJAR
DAMPAK TEKNOLOGI TERHADAP PROSES BELAJAR MENGAJAR
DAFTAR PUSTAKAAditama, M. H. R., & Selfiardy, S. (2022). Kehidupan Mahasiswa Kuliah Sambil Bekerja di Masa Pandemi Covid-19. Kidspedia: Jurnal Pendidikan Anak Usia Dini, 3(...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection
Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This h...
DRUGS USE HABITS AND PERSONALITY TRAITS OF SYNTHETIC DRUGS USERS: A DESCRIPTIVE CROSS - SECTIONAL STUDY
DRUGS USE HABITS AND PERSONALITY TRAITS OF SYNTHETIC DRUGS USERS: A DESCRIPTIVE CROSS - SECTIONAL STUDY
Background and objectives: Several studies in the world showed that distinctive personality traits linked to an increased risk of substance abuse than the general population. In ad...

