IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i12p373-d1286046.html
   My bibliography  Save this article

An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection

Author

Listed:
  • Karthikeyan Saminathan

    (Computer Science and Engineering (AIML), KPR Institute of Engineering and Technology, Coimbatore 641407, Tamil Nadu, India
    These authors contributed equally to this work.)

  • Sai Tharun Reddy Mulka

    (Computer Science and Engineering, VIT-AP University, Amaravati 522241, Andhra Pradesh, India)

  • Sangeetha Damodharan

    (Information Technology, Madras Institute of Technology, Anna University, Chennai 600044, Tamil Nadu, India)

  • Rajagopal Maheswar

    (Department of ECE, Centre for IoT and AI (CITI), KPR Institute of Engineering and Technology, Coimbatore 641407, Tamil Nadu, India)

  • Josip Lorincz

    (Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture (FESB), University of Split, Rudjera Boskovca 32, 21000 Split, Croatia
    These authors contributed equally to this work.)

Abstract

The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyber security is a more concerning issue and is now incorporated into almost every smart gadget and has become a prerequisite in every software product and service. There are various mitigations for external cyber security attacks, but hardly any for insider security threats, as they are difficult to detect and mitigate. Thus, insider cyber security threat detection has become a serious concern in recent years. Hence, this paper proposes an unsupervised deep learning approach that employs an artificial neural network (ANN)-based autoencoder to detect anomalies in an insider cyber security attack scenario. The proposed approach analyzes the behavior of the patterns of users and machines for anomalies and sends an alert based on a set security threshold. The threshold value set for security detection is calculated based on reconstruction errors that are obtained through testing the normal data. When the proposed model reconstructs the user behavior without generating sufficient reconstruction errors, i.e., no more than the threshold, the user is flagged as normal; otherwise, it is flagged as a security intruder. The proposed approach performed well, with an accuracy of 94.3% for security threat detection, a false positive rate of 11.1%, and a precision of 89.1%. From the obtained experimental results, it was found that the proposed method for insider security threat detection outperforms the existing methods in terms of performance reliability, due to implementation of ANN-based autoencoder which uses a larger number of features in the process of security threat detection.

Suggested Citation

  • Karthikeyan Saminathan & Sai Tharun Reddy Mulka & Sangeetha Damodharan & Rajagopal Maheswar & Josip Lorincz, 2023. "An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection," Future Internet, MDPI, vol. 15(12), pages 1-29, November.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:12:p:373-:d:1286046
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/12/373/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/12/373/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:12:p:373-:d:1286046. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.