User behaviour based insider threat detection using a hybrid learning approach

M Singh, BM Mehtre, S Sangeetha… - Journal of Ambient …, 2023 - Springer
Insider threats constitute a major cause of security breaches in organizations. They are the
employees/users of an organization, causing harm by performing any malicious activity …

Itdbert: Temporal-semantic representation for insider threat detection

W Huang, H Zhu, C Li, Q Lv, Y Wang… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
The objective and universal nature of user behavior data make it the primary data for insider
threat detection. Existing solutions treat user behavior as atomic symbols and do not …

Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection

T Al-Shehari, RA Alsowail - International Journal of Information Security, 2023 - Springer
Cybersecurity threats can be perpetrated by insiders or outsiders. The threats that could be
carried out by insiders are far more serious due to their privileged access, which they may …

DTITD: An Intelligent Insider Threat Detection Framework Based on Digital Twin and Self-Attention Based Deep Learning Models

ZQ Wang, A El Saddik - IEEE Access, 2023 - ieeexplore.ieee.org
Recent statistics and studies show that the loss generated by insider threats is much higher
than that generated by external attacks. More and more organizations are investing in or …

Insider threat detection based on user behaviour analysis

M Singh, BM Mehtre, S Sangeetha - … , MIND 2020, Silchar, India, July 30 …, 2020 - Springer
Insider threat detection is a major challenge for security in organizations. They are the
employees/users of an organization, posing threat to it by performing any malicious activity …

Rap-net: A resource access pattern network for insider threat detection

D Zhu, X Huang, N Li, H Sun, M Liu… - 2022 International Joint …, 2022 - ieeexplore.ieee.org
The subtle and dynamic nature of insider threat makes it one of the most challenging
problems in cyber security domain. Most of the existing studies model the problem from the …

Insider threat detection using an unsupervised learning method: COPOD

X Sun, Y Wang, Z Shi - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
In recent years, insider threat incidents and losses of companies or organizations are on the
rise, and internal network security is facing great challenges. Traditional intrusion detection …

SeqA-ITD: User behavior sequence augmentation for insider threat detection at multiple time granularities

F Zhang, X Ma, W Huang - 2022 International Joint Conference …, 2022 - ieeexplore.ieee.org
Insider threat problems have occurred frequently and caused significant damage to
organizations. Many existing techniques represent the user activities recorded in audit data …

User behaviour based insider threat detection in critical infrastructures

M Singh, BM Mehtre… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Cyber security is an important concern in critical infrastructures such as banking and
financial organizations, where a number of malicious insiders are involved. These insiders …

Towards a user and role-based behavior analysis method for insider threat detection

Q Lv, Y Wang, L Wang, D Wang - … international conference on …, 2018 - ieeexplore.ieee.org
Organizations are experiencing an ever-growing concern of how to identify and defend
against insider threats. Existing methods have distinguished the minority of users who show …