Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning

17Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Recent studies have highlighted that insider threats are more destructive than external network threats. Despite many research studies on this, the spatial heterogeneity and sample imbalance of input features still limit the effectiveness of existing machine learning-based detection methods. To solve this problem, we proposed a supervised insider threat detection method based on ensemble learning and self-supervised learning. Moreover, we propose an entity representation method based on TF-IDF to improve the detection effect. Experimental results show that the proposed method can effectively detect malicious sessions in CERT4.2 and CERT6.2 datasets, where the AUCs are 99.2% and 95.3% in the best case.

References Powered by Scopus

Anomaly detection: A survey

8903Citations
N/AReaders
Get full text

A survey of network anomaly detection techniques

1150Citations
N/AReaders
Get full text

An overview of anomaly detection techniques: Existing solutions and latest technological trends

1150Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods

18Citations
N/AReaders
Get full text

Including insider threats into risk management through Bayesian threat graph networks

9Citations
N/AReaders
Get full text

Sentiment classification for insider threat identification using metaheuristic optimized machine learning classifiers

4Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zhang, C., Wang, S., Zhan, D., Yu, T., Wang, T., & Yin, M. (2021). Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning. Security and Communication Networks, 2021. https://doi.org/10.1155/2021/4148441

Readers over time

‘22‘23‘24‘2505101520

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 14

88%

Lecturer / Post doc 2

13%

Readers' Discipline

Tooltip

Computer Science 13

76%

Engineering 2

12%

Business, Management and Accounting 1

6%

Psychology 1

6%

Save time finding and organizing research with Mendeley

Sign up for free
0