A Stacked Ensemble Framework for Detecting Malicious Insiders

Authors

  • Abolaji B Akanbi Department of Computer Science, Babcock University, Ogun State, Nigeria, Author
  • Adewale O Adebayo Department of Information Technology, Babcock University, Ogun State, Nigeria Sunday A. Idowu, Department of Software Engineering, Babcock University, Ogun State, Nigeria Author
  • Ebunoluwa E Okediran Department of Computer Science, Babcock University, Ogun State, Nigeria Author

Keywords:

Ensemble Learning, Malicious Insider Threat, Machine Learning, Stacked Generalization

Abstract

One of the mainstream strategies identified  for detecting Malicious Insider Threat (MIT) is building  stacking ensemble Machine Learning (ML) models to  reveal malevolent insider activities through anomalies in  user activities. However, most anomalies found by these  learning models were not malicious because MIT was  treated as a single entity, whereas there are various forms of  this threat with their own distinct signature. To address this  deficiency, this study focused on designing a stacked  ensemble framework for detecting malicious insider threat which utilizes a one scenario per algorithm strategy. A  model that can be used to test the framework was proposed. 

Downloads

Download data is not yet available.

References

P. A. Legg, "Visualizing the insider threat: Challenges and tools for identifying malicious user activity," in Proceedings of the 2015 IEEE Symposium on Visualization for Cyber Security, Chicago, IL, USA, 2015.

Verizon, "2019 Data Breach Investigations Report," Verizon, United States of America, 2019.

IBM, "IBM X-Force Threat Intelligence Index," 2018. [Online]. Available: https://www.ibm.com/security/data-breach/threat-intellige nce

Thales Security, " Thales Data Threat Report," 2018. [Online]. Available: http://go.thalesesecurity.com/rs/480-LWA-970/image/201 8-data-threatreport-global-edition-ar.pdf

A. E. Abdallah and I. A. Gheyas, "Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis," Big Data Analytics, 2016.

S. E. Adewumi, C. K. Ayo and T. O. Oladimeji, "Review on Insider Threat Techniques," in Journal of Physics: Confernce Series, 2019.

S. J. Berdal, A holistic approach to insider threat detection, Doctoral thesis, University of Oslo, 2018.

K. Haedong, K. Junhong, P. Minsik, K. Pilsung and C. Suhyoun, "Insider Threat Detection Based on User Behavior Modelling and Anomaly Detection Algorithms," Journal of Applied Sciences, pp. 1-5, 2019.

A. Kondaveeti, "Insider Threat Detection: Detecting variance in user behavior using an ensemble approach," 2017. [Online]. Available: https://content.pivotal.io/blog/insider-threat-detection-dete

cting-variance-in-user-behavior-using-an-ensemble-appro ach.

O. Igbe and T. Saadawi, "Insider Threat Detection using an Artificial Immune System Algorithm," IEEE, pp. 10-19, 2018.

N. Elmrabit, S.-H. Yang and L. Yang, "Insider Threats in Information Security," in 21st International Conference on Automation and Computing (ICAC), 2015.

A. N. Erekat, An Ensemble Learning Approach for Surgery Cancellation Prediction for Efficient Operating Room Planning, New York: ProQuest LLC, 2017.

E. B. M. Bashier, M. B. Khan and M. Mohammed, "Machine Learning: Algorithms and application," in Machine Learning: Algorithms and application, Boca Raton, CRC Press, 2016, pp. 2-16.

W. Li, W. Meng and L. F. Kwok, "Enhancing collaborative intrustion detection networks against inside attacks using supervised intrusion sensitive-based trust management model," Network and Computer Applications, pp. 135-145, 2017.

Downloads

Published

2020-07-04

How to Cite

A Stacked Ensemble Framework for Detecting Malicious Insiders. (2020). International Journal of Innovative Research in Computer Science & Technology, 8(4), 294–298. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13237