attackers, inside attackers have more privileges and legitimate access to information and
facilities that can cause considerable damage to an organization. Most organizations that
implement traditional cybersecurity techniques, such as intrusion detection systems, fail to
detect insider threats given the lack of extensive knowledge on insider behavior patterns.
However, a sophisticated method is necessary for an in-depth understanding of insider …