Insider threats detection model for email content using statistical analysis

An insider threat has become one of the most challenging malicious activities in cybersecurity defence systems in a contrast to outsider threats recently. Usually, IP theft, fraud and sabotage against legal information are three well-known types of insider threat. Since an insider threat usually exp...

Full description

Saved in:
Bibliographic Details
Main Author: Mohammad, Nur Ameera Natasha
Format: Thesis
Language:English
English
Published: 2022
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/26927/1/Insider%20threats%20detection%20model%20for%20email%20content%20using%20statistical%20analysis.pdf
http://eprints.utem.edu.my/id/eprint/26927/2/Insider%20threats%20detection%20model%20for%20email%20content%20using%20statistical%20analysis.pdf
http://eprints.utem.edu.my/id/eprint/26927/
https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=122122
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.26927
record_format eprints
spelling my.utem.eprints.269272023-10-16T11:00:28Z http://eprints.utem.edu.my/id/eprint/26927/ Insider threats detection model for email content using statistical analysis Mohammad, Nur Ameera Natasha Q Science (General) QA Mathematics An insider threat has become one of the most challenging malicious activities in cybersecurity defence systems in a contrast to outsider threats recently. Usually, IP theft, fraud and sabotage against legal information are three well-known types of insider threat. Since an insider threat usually expands and spread internally, no one could predict what, when and how exactly malicious insider launched their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal threat as this medium is widely used by everyone to communicate, share, and exchange confidential information. Therefore, it is extremely important to understand the nature of insider threat behavior beforehand and construct an accurate detection model. Furthermore, every single keyword used in an email can reflect the behavior of an individual and can be used to determine their intentions, such as having a motive to launch an insider threat or not. Henceforth, an innovative approach is proposed in modelling insider threat detection in this work. In addition, various approaches such as scoring, Friedman, linear regression (R2) and correlation coefficient applied to analyse an insider threat relationship between historical insider threats behavior and relevant extracted keywords from email content. Firstly, the email content filtered into three different factors that influence the characteristics of an insider such as motive, opportunity and capability, before calculating the scores for the entire insider’s keywords. Next, the Friedman statistical used to determine the minimum differences between each extracted insider threats keywords that represent different insider threat factors (motive, opportunity, capability). Besides, linear regression applied to estimate the relationship of an insider threat from training keywords and testing keywords with allocating an anomaly score. Finally, the correlation coefficient approach used to determine how strong a relationship is between extracted insider threats keywords and insider threat behavior in this research. The proposed modelling approach has been evaluated using the benchmark dataset known as CERT that comprises a malicious email file. Throughout the experiment, the proposed insider threats detection approach has achieved a higher attack detection rate as well as minimized undetectable insider threats behavior as compared to the previous researcher works. 2022 Thesis NonPeerReviewed text en http://eprints.utem.edu.my/id/eprint/26927/1/Insider%20threats%20detection%20model%20for%20email%20content%20using%20statistical%20analysis.pdf text en http://eprints.utem.edu.my/id/eprint/26927/2/Insider%20threats%20detection%20model%20for%20email%20content%20using%20statistical%20analysis.pdf Mohammad, Nur Ameera Natasha (2022) Insider threats detection model for email content using statistical analysis. Masters thesis, Universiti Teknikal Malaysia Melaka. https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=122122
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
English
topic Q Science (General)
QA Mathematics
spellingShingle Q Science (General)
QA Mathematics
Mohammad, Nur Ameera Natasha
Insider threats detection model for email content using statistical analysis
description An insider threat has become one of the most challenging malicious activities in cybersecurity defence systems in a contrast to outsider threats recently. Usually, IP theft, fraud and sabotage against legal information are three well-known types of insider threat. Since an insider threat usually expands and spread internally, no one could predict what, when and how exactly malicious insider launched their attacks. This is with a view of fact that an email becomes one of the primary targets of an internal threat as this medium is widely used by everyone to communicate, share, and exchange confidential information. Therefore, it is extremely important to understand the nature of insider threat behavior beforehand and construct an accurate detection model. Furthermore, every single keyword used in an email can reflect the behavior of an individual and can be used to determine their intentions, such as having a motive to launch an insider threat or not. Henceforth, an innovative approach is proposed in modelling insider threat detection in this work. In addition, various approaches such as scoring, Friedman, linear regression (R2) and correlation coefficient applied to analyse an insider threat relationship between historical insider threats behavior and relevant extracted keywords from email content. Firstly, the email content filtered into three different factors that influence the characteristics of an insider such as motive, opportunity and capability, before calculating the scores for the entire insider’s keywords. Next, the Friedman statistical used to determine the minimum differences between each extracted insider threats keywords that represent different insider threat factors (motive, opportunity, capability). Besides, linear regression applied to estimate the relationship of an insider threat from training keywords and testing keywords with allocating an anomaly score. Finally, the correlation coefficient approach used to determine how strong a relationship is between extracted insider threats keywords and insider threat behavior in this research. The proposed modelling approach has been evaluated using the benchmark dataset known as CERT that comprises a malicious email file. Throughout the experiment, the proposed insider threats detection approach has achieved a higher attack detection rate as well as minimized undetectable insider threats behavior as compared to the previous researcher works.
format Thesis
author Mohammad, Nur Ameera Natasha
author_facet Mohammad, Nur Ameera Natasha
author_sort Mohammad, Nur Ameera Natasha
title Insider threats detection model for email content using statistical analysis
title_short Insider threats detection model for email content using statistical analysis
title_full Insider threats detection model for email content using statistical analysis
title_fullStr Insider threats detection model for email content using statistical analysis
title_full_unstemmed Insider threats detection model for email content using statistical analysis
title_sort insider threats detection model for email content using statistical analysis
publishDate 2022
url http://eprints.utem.edu.my/id/eprint/26927/1/Insider%20threats%20detection%20model%20for%20email%20content%20using%20statistical%20analysis.pdf
http://eprints.utem.edu.my/id/eprint/26927/2/Insider%20threats%20detection%20model%20for%20email%20content%20using%20statistical%20analysis.pdf
http://eprints.utem.edu.my/id/eprint/26927/
https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=122122
_version_ 1781710011467038720
score 13.211869