Detecting the Insider Threat with Long Short Term Memory (LSTM) Neural Networks

07/20/2020
by   Eduardo López, et al.
0

Information systems enable many organizational processes in every industry. The efficiencies and effectiveness in the use of information technologies create an unintended byproduct: misuse by existing users or somebody impersonating them - an insider threat. Detecting the insider threat may be possible if thorough analysis of electronic logs, capturing user behaviors, takes place. However, logs are usually very large and unstructured, posing significant challenges for organizations. In this study, we use deep learning, and most specifically Long Short Term Memory (LSTM) recurrent networks for enabling the detection. We demonstrate through a very large, anonymized dataset how LSTM uses the sequenced nature of the data for reducing the search space and making the work of a security analyst more effective.

READ FULL TEXT
research
07/14/2017

Simplified Long Short-term Memory Recurrent Neural Networks: part II

This is part II of three-part work. Here, we present a second set of int...
research
07/13/2020

Using LSTM for the Prediction of Disruption in ADITYA Tokamak

Major disruptions in tokamak pose a serious threat to the vessel and its...
research
02/03/2022

Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)

In our current society, the inter-connectivity of devices provides easy ...
research
01/26/2021

"Laughing at you or with you": The Role of Sarcasm in Shaping the Disagreement Space

Detecting arguments in online interactions is useful to understand how c...
research
05/30/2017

Generating Steganographic Text with LSTMs

Motivated by concerns for user privacy, we design a steganographic syste...
research
09/11/2018

Time Series Analysis of Clickstream Logs from Online Courses

Due to the rapidly rising popularity of Massive Open Online Courses (MOO...
research
01/23/2019

Stein Variational Online Changepoint Detection with Applications to Hawkes Processes and Neural Networks

Bayesian online changepoint detection (BOCPD) (Adams & MacKay, 2007) off...

Please sign up or login with your details

Forgot password? Click here to reset