Mitigating Insider Threats through Behavioural Analytics and Cybersecurity Policies

Main Article Content

Vamshidhar Reddy Vemula
Tejaswi Yarraguntla

Abstract

The insider threat is one of the most prominent risks in today's cybersecurity environment, primarily due to the privileged access that insiders have inside the organization. These threats could stem from malicious intent, negligence, or through compromised credentials, therefore being hard to detect using any typical methods by cybersecurity. It will explore how a combination of behavioral analytics and the overall cybersecurity policies can be used to mitigate these insider threats effectively. Behavioural analytics, which is based on machine learning models, monitors and predicts the anomaly that could be represented by anomalous user behavior that may be a potential insider threat. Meanwhile, cybersecurity policy represents an active defense layer in outlining guidelines of access control data handling and employee behavior. This would therefore allow an organization to identify and block insider threats in real time through the minimization of false positives as well as enhancing its general security posture in an organizational setting upon integration of the two approaches. This real-world insider threat dataset the author uses goes on to further illustrate just how well machine learning algorithms can and do identify suspicious activities-cases in point being Random Forest and Support Vector Machines. The authors continue to show a much stronger evaluation of the impact of cybersecurity policies in counteracting insider threats by showing some of the flaws, such as weighing the privacy concerns against achieving employee confidence. This study gives real actionable insights into how organizations can strengthen their defense against insider threats and consequently reduce the risk of data breaches, intellectual property theft, and sabotage.

Downloads

Download data is not yet available.

Article Details

How to Cite
Mitigating Insider Threats through Behavioural Analytics and Cybersecurity Policies. (2021). International Meridian Journal, 3(3), 1-20. https://meridianjournal.in/index.php/IMJ/article/view/87
Section
Articles

How to Cite

Mitigating Insider Threats through Behavioural Analytics and Cybersecurity Policies. (2021). International Meridian Journal, 3(3), 1-20. https://meridianjournal.in/index.php/IMJ/article/view/87

References

R. S. R. B. Alhassan, "Mitigating Insider Threats in Cloud Computing Environments," IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 153-164, Jan.-Mar. 2020. doi: 10.1109/TCC.2018.2853540.

M. H. V. Mehta, "A Survey of Insider Threat Detection and Mitigation Strategies," IEEE Access, vol. 8, pp. 83545-83564, 2020. doi: 10.1109/ACCESS.2020.2995208.

A. A. H. M. Shafiq and M. N. Z. A. Khan, "Behavioral Analytics for Insider Threat Detection: A Survey," IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1512-1527, June 2019. doi: 10.1109/TIFS.2018.2874601.

Cybersecurity Insiders, "2020 Insider Threat Report," Cybersecurity Insiders, 2020. [Online]. Available: [Link].

J. P. H. Davidson, "Behavioral Analysis for Detecting Insider Threats," Journal of Cybersecurity, vol. 6, no. 3, pp. 195-205, 2020. doi: 10.1109/JCS.2020.2990321.

A. D. K. Amraei and S. A. B. Sayadi, "An Empirical Study on the Role of Employees in Insider Threats: A Behavioral Approach," IEEE Access, vol. 8, pp. 107560-107570, 2020. doi: 10.1109/ACCESS.2020.3002046.

A. A. S. Alshahrani, "A Systematic Review of Insider Threats Detection Approaches in Information Systems," IEEE Access, vol. 8, pp. 85930-85942, 2020. doi: 10.1109/ACCESS.2020.2997821.

R. M. B. Brant, "Human Factors and Cybersecurity: A Review of Behavioral Threats," IEEE Transactions on Human-Machine Systems, vol. 50, no. 5, pp. 447-455, Oct. 2020. doi: 10.1109/THMS.2020.2991641.

J. B. K. Stouffer, "Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security," NIST Special Publication, no. 800-46, 2016. [Online]. Available: [Link].

C. R. Z. C. Garcia, "A Survey on Cybersecurity Policies: Challenges and Future Directions," IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2451-2475, Fourthquarter 2020. doi: 10.1109/COMST.2020.2995405.

A. K. K. Adhikari, "Assessing the Effectiveness of Cybersecurity Policies: A Case Study of an Insurer," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2710-2721, 2020. doi: 10.1109/TIFS.2020.2971318.

S. B. J. R. R. C. D. J. Cornejo, "The Role of Security Awareness in Mitigating Insider Threats," IEEE Access, vol. 8, pp. 80040-80054, 2020. doi: 10.1109/ACCESS.2020.2995078.

M. T. N. Al-Shamri, "Strategies for Effective Insider Threat Mitigation in Organizations," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 917-930, July-Sept. 2020. doi: 10.1109/TDSC.2019.2910541.

L. M. L. M. K. E. C. A. G. O. T. Kim, "A Novel Approach for Insider Threat Detection Using User Behavioral Analytics," IEEE Transactions on Information Forensics and Security, vol. 14, no. 7, pp. 1914-1929, July 2019. doi: 10.1109/TIFS.2019.2905685.

R. S. R. N. F. A. A. A. M. L. M. X. M. Z. X. P. X. E. J. A. I. J. A. Wang, "A Survey of Insider Threat Detection Approaches and Techniques," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1964-1982, Thirdquarter 2020. doi: 10.1109/COMST.2020.2996821.

Ronakkumar Bathani. (2021). Enabling Predictive Analytics in the Utilities: Power Generation and Consumption Forecasting. International Journal of Communication Networks and Information Security (IJCNIS), 13(1), 197–204. Retrieved from https://ijcnis.org/index.php/ijcnis/article/view/7503

Ronakkumar Bathani (2020) Cost Effective Framework For Schema Evolution In Data Pipelines: Ensuring Data Consistency. (2020). Journal Of Basic Science And Engineering, 17(1), .Retrieved from https://yigkx.org.cn/index.php/jbse/article/view/300

Most read articles by the same author(s)

<< < 1 2 3 4 5 > >>