A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods

FR Alzaabi, A Mehmood - IEEE Access, 2024 - ieeexplore.ieee.org
Insider threat detection has become a paramount concern in modern times where
organizations strive to safeguard their sensitive information and critical assets from …

Behavioral based insider threat detection using deep learning

R Nasir, M Afzal, R Latif, W Iqbal - IEEE Access, 2021 - ieeexplore.ieee.org
The most detrimental cyber attacks are usually not originated by malicious outsiders or
malware but from trusted insiders. The main advantage insider attackers have over external …

Automation and orchestration of zero trust architecture: Potential solutions and challenges

Y Cao, SR Pokhrel, Y Zhu, R Doss, G Li - Machine Intelligence Research, 2024 - Springer
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and
access resources. ZTA is non-perimeter-based defence, which has been emerging as a …

Insider threat detection using machine learning approach

B Bin Sarhan, N Altwaijry - Applied Sciences, 2022 - mdpi.com
Insider threats pose a critical challenge for securing computer networks and systems. They
are malicious activities by authorised users that can cause extensive damage, such as …

An efficient pattern-based approach for insider threat classification using the image-based feature representation

K Randive, R Mohan, AM Sivakrishna - Journal of Information Security and …, 2023 - Elsevier
Insider threats are expensive, difficult to detect, and sadly, on the rise. Despite significant
research efforts, existing approaches are inadequate in accuracy and precision. They also …

User behaviour based insider threat detection using a hybrid learning approach

M Singh, BM Mehtre, S Sangeetha… - Journal of Ambient …, 2023 - Springer
Insider threats constitute a major cause of security breaches in organizations. They are the
employees/users of an organization, causing harm by performing any malicious activity …

User behavior based insider threat detection using a multi fuzzy classifier

M Singh, BM Mehtre, S Sangeetha - Multimedia Tools and Applications, 2022 - Springer
Insider threats are a significant source of security breaches in organizations. They are often
identified using machine and deep learning methods. These methods rely on predefined …

Learning algorithm recommendation framework for IS and CPS security: Analysis of the RNN, LSTM, and GRU contributions

C Feltus - International Journal of Systems and Software Security …, 2022 - igi-global.com
Artificial intelligence and machine learning have recently made outstanding contributions to
the performance of information system and cyber--physical system security. There has been …

Comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection

T Al-Shehari, M Kadrie, MN Al-Mhiqani, T Alfakih… - Scientific Reports, 2024 - nature.com
Insider threats pose a significant challenge in cybersecurity, demanding advanced detection
methods for effective risk mitigation. This paper presents a comparative evaluation of data …

[HTML][HTML] Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation

Y Wei, KP Chow, SM Yiu - Forensic Science International: Digital …, 2021 - Elsevier
The complexity, concealment and infrequency of malicious internal actions make it difficult to
detect insider threats. In the process of traditional reactive forensic investigation, analysis …