Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Behavioral based threat detection

View through CrossRef
Insider threats pose a significant risk to organizations as they exploit legitimate access to bypass traditional security measures, making them harder to detect than external attacks. This study addresses the challenge by utilizing deep learning to analyze user behavior and identify malicious activities through a carefully selected set of event- based features. By training on the CMU CERT r4.2 dataset, the proposed model effectively learns patterns of adversarial behavior, reducing false positives while maintaining high detection accuracy. The paper presents a deep learning-based approach for insider threat detection, emphasizing behavioral analysis to distinguish between normal and malicious user activities. By leveraging a rich event-based feature set, including logon/logoff events, user roles, and functional units, the model is trained on the CMU CERT r4.2 dataset to identify adversarial behavior with high accuracy and a low false positive rate. The proposed method outperforms several established techniques, including LSTM-CNN, random forest, LSTMRNN, one-class SVM, Markov chain models, multi-state LSTM-CNN, and GRU-Skipgram. Experimental results demonstrate the effectiveness of this approach, achieving 90.60% accuracy, 97% precision, and a 94% F1- score, making it a promising solution for mitigating insider threats in organizations. Key Words:Insider threats, Legitimate access, Bypass security measures, Detection, Deep learning-based approach, User behavior analysis, Event-based features, Logon/logoff events, User roles, Functional units, CMU CERT r4.2 dataset, Adversarial behavior, False positives, LSTM-CNN, Random forest, LSTM-RNN, One-class SVM, Markov chain models, Multi-state LSTM-CNN, GRU-skipgram, Accuracy(90.60%), Precision(97%), F1score(94%), Cybersecurity defenses.
Title: Behavioral based threat detection
Description:
Insider threats pose a significant risk to organizations as they exploit legitimate access to bypass traditional security measures, making them harder to detect than external attacks.
This study addresses the challenge by utilizing deep learning to analyze user behavior and identify malicious activities through a carefully selected set of event- based features.
By training on the CMU CERT r4.
2 dataset, the proposed model effectively learns patterns of adversarial behavior, reducing false positives while maintaining high detection accuracy.
The paper presents a deep learning-based approach for insider threat detection, emphasizing behavioral analysis to distinguish between normal and malicious user activities.
By leveraging a rich event-based feature set, including logon/logoff events, user roles, and functional units, the model is trained on the CMU CERT r4.
2 dataset to identify adversarial behavior with high accuracy and a low false positive rate.
The proposed method outperforms several established techniques, including LSTM-CNN, random forest, LSTMRNN, one-class SVM, Markov chain models, multi-state LSTM-CNN, and GRU-Skipgram.
Experimental results demonstrate the effectiveness of this approach, achieving 90.
60% accuracy, 97% precision, and a 94% F1- score, making it a promising solution for mitigating insider threats in organizations.
Key Words:Insider threats, Legitimate access, Bypass security measures, Detection, Deep learning-based approach, User behavior analysis, Event-based features, Logon/logoff events, User roles, Functional units, CMU CERT r4.
2 dataset, Adversarial behavior, False positives, LSTM-CNN, Random forest, LSTM-RNN, One-class SVM, Markov chain models, Multi-state LSTM-CNN, GRU-skipgram, Accuracy(90.
60%), Precision(97%), F1score(94%), Cybersecurity defenses.

Related Results

ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Financial Attitudes and Non-Performing Loans among Phuket’s Generation Y
Financial Attitudes and Non-Performing Loans among Phuket’s Generation Y
Aim/Purpose: This study investigated the attitudinal and behavioral determinants of non-performing loans (NPLs) among Generation Y individuals aged 30–35 in Phuket Province, Thaila...
Childhood Behavioral and Mental Health Problems in Jordan
Childhood Behavioral and Mental Health Problems in Jordan
Abstract Introduction Pediatric behavioral and mental health disorders are a leading cause of childhood morbidity worldwide. In...
AI-POWERED THREAT DETECTION
AI-POWERED THREAT DETECTION
The traditional signature-based measures of cybersecurity faced growing challenges due to advanced cyber threats. Cyber AI, on the other hand, aided in automating dynamic and adapt...
Threat Modeling Based on a Design Basis Threat for Nuclear Security
Threat Modeling Based on a Design Basis Threat for Nuclear Security
Identification of the design basis threat (DBT) of a nuclear facility is an important factor of overall safety, for which the operator is mainly responsible per the guidelines of t...
Impact of behavioral inhibitory control and startle reactivity to uncertain threat on youth suicide risk
Impact of behavioral inhibitory control and startle reactivity to uncertain threat on youth suicide risk
AbstractPoor inhibitory control and exaggerated threat reactivity are two well‐established risk factors for suicide. Theory suggests that these two factors may interact to influenc...
Radar emitter threat evaluation based on the algorithm involving behavioral characteristics and BiasSVD
Radar emitter threat evaluation based on the algorithm involving behavioral characteristics and BiasSVD
Abstract In order to minimize the impact of errors and uncertainties that arise from signals received by reconnaissance equipment and airborne radar on emitter threat evalu...

Back to Top