


Volume 20 No 10 (2022)
Download PDF
Improved Classification Model in Handling Insider Threat through Supervised Machine Learning Techniques
Arul Selvam P , Tamije Selvy P
Abstract
Information technology systems face increasing cyber security threats, mostly from insiders. Network security
mechanism for insiders are not as strict as for rest. Also insider can easily bypass security or have legitimate access to
confidential documents, therefore to detect and prevent insider threat is a growing challenge. The aim of this paper is
to implement predictive models that are using linguistic analysis to determine an employee’s risk level computermediated communication, particularly emails. The emails log part of the TWOS dataset has been analyzed using
supervised machine learning techniques. The data set comprise behavior traces of 24 users observed over 5 days spam.
The existing pivotal models collated and contrasted for the following algorithms: Adaboost, Naive Bayes (NB), Logistic
Regression (LR), KNN, Linear Regression (LR) and Support Vector Machine (SVM). Among all these algorithms,
Adaboost has outperformed with 98.3% Accuracy and 0.983 AUC for identification of malicious emails. Although we
trained the model on original dataset, but data is small. Results of the model could be improved using larger dataset.
In this paper, we shall test different deep learning classifiers to check the performance of the models
Keywords
Machine learning, Text Classification, Insider Threat, Malicious Emails, Classification Metrics
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.