Dr Naghmeh Moradpoor N.Moradpoor@napier.ac.uk
Associate Professor
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset
Moradpoor, Naghmeh; Hall, Adam
Authors
Adam Hall
Abstract
An insider threat can take on many forms and fall under different categories. This includes: malicious insider, careless/unaware/uneducated/naïve employee, and third-party contractor. A malicious insider, which can be a criminal agent recruited as a legitimate candidate or a disgruntled employee seeking revenge, is likely the most difficult category to detect, prevent and mitigate. Some malicious insiders misuse their positions of trust by disrupting normal operations, while others transfer confidential or vital information about the victim organisation which can damage the employer's marketing position and/or reputation. In addition, some just lose their credentials (i.e. usernames and passwords) which can then be abused or stolen by an external hacker to breach the network using their name. Additionally, malicious insiders have free rein to roam a victim organisation unconstrained which can lead to successfully collecting personal information of other colleagues and/or clients, or even installing malicious software into the system/network.
Machine learning techniques have been studied in published literature as a promising solution for such threats. However, they can be bias and/or inaccurate when the associated dataset is hugely imbalanced. In this case, an inaccurate classification could result in a huge cost to individuals and/or organisations. Therefore, this paper addresses the insider threat detection on an extremely imbalanced dataset which includes employing a popular balancing technique known as spread subsample. Our results show that although balancing our dataset using this technique did not improve performance metrics such as: classification accuracy, true positive rate, false positive rate, precision, recall, and f-measure it did improve the time taken to build the model and the time taken to test the model. Additionally, we realised that running our chosen classifiers with parameters other than the default ones has an impact on both balanced and imbalanced scenarios but the impact is significantly stronger when using the imbalanced dataset.
Citation
Moradpoor, N., & Hall, A. (2020). Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. International Journal of Cyber Warfare and Terrorism, 10(2), https://doi.org/10.4018/IJCWT.2020040101
Journal Article Type | Article |
---|---|
Acceptance Date | Jan 22, 2020 |
Publication Date | 2020-04 |
Deposit Date | Feb 3, 2020 |
Publicly Available Date | Mar 9, 2020 |
Print ISSN | 1947-3435 |
Electronic ISSN | 1947-3443 |
Publisher | IGI Global |
Peer Reviewed | Peer Reviewed |
Volume | 10 |
Issue | 2 |
DOI | https://doi.org/10.4018/IJCWT.2020040101 |
Keywords | Insider Threat; Supervised Machine Learning; Imbalanced Dataset; Spread Subsample; Data Pre-Processing |
Public URL | http://researchrepository.napier.ac.uk/Output/2531926 |
Files
Insider Threat Detection Using Supervised Machine Learning Algorithms On An Extremely Imbalanced Dataset (publisher PDF)
(1.2 Mb)
PDF
Copyright Statement
The published version of this article is available at: Moradpoor, N., & Hall, A. (2020). Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. International Journal of Cyber Warfare and Terrorism, 10(2), https://doi.org/10.4018/IJCWT.2020040101
You might also like
Machine Learning for Smart Healthcare Management Using IoT
(2024)
Book Chapter
A Hybrid Deep Learning-based Intrusion Detection System for IoT Networks
(2023)
Journal Article
Building Towards Automated Cyberbullying Detection: A Comparative Analysis
(2022)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search