A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

Insider threat detection based on user behavior modeling and anomaly detection algorithms

J Kim, M Park, H Kim, S Cho, P Kang - Applied Sciences, 2019 - mdpi.com
Insider threats are malicious activities by authorized users, such as theft of intellectual
property or security information, fraud, and sabotage. Although the number of insider threats …

Enhancing false negative and positive rates for efficient insider threat detection

M AlSlaiman, MI Salman, MM Saleh, B Wang - Computers & Security, 2023 - Elsevier
Insider threats on information security can become a burden for organizations. However,
outsider attacks have received more attention compared to insider attacks. Many …

Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques

A Mills, P Legg - Journal of Cybersecurity and Privacy, 2020 - mdpi.com
Malware analysis is fundamental for defending against prevalent cyber security threats and
requires a means to deploy and study behavioural software traits as more sophisticated …

Insider-threat detection using gaussian mixture models and sensitivity profiles

J Happa - Computers & Security, 2018 - Elsevier
The insider threat is one of the most challenging problems to detect due to its complex
nature and significant impact on organisations. Insiders pose a great threat on organisations …

Evaluating awareness and perception of botnet activity within consumer internet-of-things (IoT) networks

CD McDermott, JP Isaacs, AV Petrovski - Informatics, 2019 - mdpi.com
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices,
has led to the production of swathes of insecure Internet-connected devices. Many can be …

[PDF][PDF] SoK: A Systematic Review of Insider Threat Detection.

A Kim, J Oh, J Ryu, J Lee, K Kwon, K Lee - J. Wirel. Mob. Networks …, 2019 - jowua.com
Due to the subtle nature of the insider threat, government bodies and corporate
organizations are forced to face the insider threat that is both malicious and accidental. In …

[PDF][PDF] Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics.

A Alshehri, N Khan, A Alowayr… - … Systems Science & …, 2023 - academia.edu
Machine Learning coupled with User Behavior Analytics. The framework models the user
behavior as sequences of events representing the user activities at such a network. The …

Vasabi: Hierarchical user profiles for interactive visual user behaviour analytics

PH Nguyen, R Henkin, S Chen… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
User behaviour analytics (UBA) systems offer sophisticated models that capture users'
behaviour over time with an aim to identify fraudulent activities that do not match their …