Remote Fraud and Leakage Detection System Based on LPWAN System for Flow Notification and Advanced Visualization in the Cloud

Author(s):  
Dario Protulipac ◽  
Goran Djambic ◽  
Leo Mršić
Author(s):  
T. Arpitha ◽  
Divya Kiran ◽  
V.S.N. Sitaram Gupta ◽  
Punithavathi Duraiswamy

Author(s):  
Meteb Altaf ◽  
Alaa Menshawi ◽  
Ruba Al-Skate ◽  
Taghreed Al-Musharraf ◽  
Wejdan Al-Sakaker

Entropy ◽  
2021 ◽  
Vol 23 (10) ◽  
pp. 1258
Author(s):  
Taher Al-Shehari ◽  
Rakan A. Alsowail

Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks. Most existing approaches in the field of insider threat focused on detecting general insider attack scenarios. However, insider attacks can be carried out in different ways, and the most dangerous one is a data leakage attack that can be executed by a malicious insider before his/her leaving an organization. This paper proposes a machine learning-based model for detecting such serious insider threat incidents. The proposed model addresses the possible bias of detection results that can occur due to an inappropriate encoding process by employing the feature scaling and one-hot encoding techniques. Furthermore, the imbalance issue of the utilized dataset is also addressed utilizing the synthetic minority oversampling technique (SMOTE). Well known machine learning algorithms are employed to detect the most accurate classifier that can detect data leakage events executed by malicious insiders during the sensitive period before they leave an organization. We provide a proof of concept for our model by applying it on CMU-CERT Insider Threat Dataset and comparing its performance with the ground truth. The experimental results show that our model detects insider data leakage events with an AUC-ROC value of 0.99, outperforming the existing approaches that are validated on the same dataset. The proposed model provides effective methods to address possible bias and class imbalance issues for the aim of devising an effective insider data leakage detection system.


2014 ◽  
Vol 51 (11) ◽  
pp. 110602 ◽  
Author(s):  
黄悦 Huang Yue ◽  
王强 Wang Qiang ◽  
杨其华 Yang Qihua ◽  
章仁杰 Zhang Renjie

1992 ◽  
Author(s):  
Masao Takatoo ◽  
Chieko Onuma ◽  
Masayuki Fukai

Sign in / Sign up

Export Citation Format

Share Document