Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm

Insider attacks may inflict far greater damage to an organization than outsider threats since insiders are authorized users who are acquainted with the business’s system, making detection harder. Many techniques to detecting insider threats have been developed, but they are neither flexib...

Full description

Bibliographic Details
Main Authors: Taher Al-Shehari, Muna Al-Razgan, Taha Alfakih, Rakan A. Alsowail, Saravanan Pandiaraj
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10290890/
_version_ 1827778773027651584
author Taher Al-Shehari
Muna Al-Razgan
Taha Alfakih
Rakan A. Alsowail
Saravanan Pandiaraj
author_facet Taher Al-Shehari
Muna Al-Razgan
Taha Alfakih
Rakan A. Alsowail
Saravanan Pandiaraj
author_sort Taher Al-Shehari
collection DOAJ
description Insider attacks may inflict far greater damage to an organization than outsider threats since insiders are authorized users who are acquainted with the business’s system, making detection harder. Many techniques to detecting insider threats have been developed, but they are neither flexible nor resilient owing to different obstacles (e.g., lack of real-world dataset and highly skewed class distribution of the available dataset), making insider threat detection an understudied research field. Previous techniques attempted to solve the dataset’s imbalance issue by increasing or lowering the observations of the dataset’s classes, however this might lead to underfitting and overfitting problems. We present an insider threat detection model that addresses the class imbalance problem at the algorithm level using anomaly-based techniques, as an enhancement over previous approaches. To limit the effect of skewed class distribution on insider threat detection, the Isolation Forest (IF) technique is used. The model is verified using the benchmarked CERT’s insider threat dataset, which is significantly unbalanced, with a small number of malicious cases vs a large number of non-malicious instances. Several contamination ratios of IF’s parameters are used to verify the model’s performance throughout a range of anomaly scores. The experimental findings reveal that the suggested model handles the dataset class imbalance problem with an accuracy score of 98%. The findings are compared to the baseline technique to demonstrate how the proposed model enhances detection performance and addresses the problem of data imbalance. The findings indicate the usefulness of the suggested approach for identifying insider threats when compared to previous studies.
first_indexed 2024-03-11T14:38:35Z
format Article
id doaj.art-f8bfb587c5964fcf856b85baa7d0e471
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-11T14:38:35Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-f8bfb587c5964fcf856b85baa7d0e4712023-10-30T23:01:02ZengIEEEIEEE Access2169-35362023-01-011111817011818510.1109/ACCESS.2023.332675010290890Insider Threat Detection Model Using Anomaly-Based Isolation Forest AlgorithmTaher Al-Shehari0https://orcid.org/0000-0002-9783-919XMuna Al-Razgan1https://orcid.org/0000-0002-9705-3867Taha Alfakih2https://orcid.org/0000-0003-0366-5932Rakan A. Alsowail3Saravanan Pandiaraj4Computer Skills, Department of Self-Development Skills, Common First Year Deanship, King Saud University, Riyadh, Saudi ArabiaDepartment of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi ArabiaComputer Skills, Department of Self-Development Skills, Common First Year Deanship, King Saud University, Riyadh, Saudi ArabiaComputer Skills, Department of Self-Development Skills, Common First Year Deanship, King Saud University, Riyadh, Saudi ArabiaInsider attacks may inflict far greater damage to an organization than outsider threats since insiders are authorized users who are acquainted with the business’s system, making detection harder. Many techniques to detecting insider threats have been developed, but they are neither flexible nor resilient owing to different obstacles (e.g., lack of real-world dataset and highly skewed class distribution of the available dataset), making insider threat detection an understudied research field. Previous techniques attempted to solve the dataset’s imbalance issue by increasing or lowering the observations of the dataset’s classes, however this might lead to underfitting and overfitting problems. We present an insider threat detection model that addresses the class imbalance problem at the algorithm level using anomaly-based techniques, as an enhancement over previous approaches. To limit the effect of skewed class distribution on insider threat detection, the Isolation Forest (IF) technique is used. The model is verified using the benchmarked CERT’s insider threat dataset, which is significantly unbalanced, with a small number of malicious cases vs a large number of non-malicious instances. Several contamination ratios of IF’s parameters are used to verify the model’s performance throughout a range of anomaly scores. The experimental findings reveal that the suggested model handles the dataset class imbalance problem with an accuracy score of 98%. The findings are compared to the baseline technique to demonstrate how the proposed model enhances detection performance and addresses the problem of data imbalance. The findings indicate the usefulness of the suggested approach for identifying insider threats when compared to previous studies.https://ieeexplore.ieee.org/document/10290890/Anomaly detectiondataset imbalance issueinsider threat detectionisolation forestmachine learning
spellingShingle Taher Al-Shehari
Muna Al-Razgan
Taha Alfakih
Rakan A. Alsowail
Saravanan Pandiaraj
Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
IEEE Access
Anomaly detection
dataset imbalance issue
insider threat detection
isolation forest
machine learning
title Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
title_full Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
title_fullStr Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
title_full_unstemmed Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
title_short Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
title_sort insider threat detection model using anomaly based isolation forest algorithm
topic Anomaly detection
dataset imbalance issue
insider threat detection
isolation forest
machine learning
url https://ieeexplore.ieee.org/document/10290890/
work_keys_str_mv AT taheralshehari insiderthreatdetectionmodelusinganomalybasedisolationforestalgorithm
AT munaalrazgan insiderthreatdetectionmodelusinganomalybasedisolationforestalgorithm
AT tahaalfakih insiderthreatdetectionmodelusinganomalybasedisolationforestalgorithm
AT rakanaalsowail insiderthreatdetectionmodelusinganomalybasedisolationforestalgorithm
AT saravananpandiaraj insiderthreatdetectionmodelusinganomalybasedisolationforestalgorithm