Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

Iffat Gheyas, Ali E. Abdallah

    Research output: Contribution to journalArticlepeer-review

    Abstract

    Cyber security is vital to the success of today?s digital economy. The major security threats are coming from within, as opposed to outside forces. Insider threat detection and prediction are important mitigation techniques. This study addresses the following research questions: 1) what are the research trends in insider threat detection and prediction nowadays? 2) What are the challenges associated with insider threat detection and prediction? 3) What are the best-to-date insider threat detection and prediction algorithms? We conduct a systematic review of 37 articles published in peer-reviewed journals, conference proceedings and edited books for the period of 1950?2015 to address the first two questions. Our survey suggests that game theoretic approach (GTA) is a popular source of insider threat data; the insiders? online activities are the most widely used features in insider threat detection and prediction; most of the papers use single point estimates of threat likelihood; and graph algorithms are the most widely used tools for detecting and predicting insider threats. The key challenges facing the insider threat detection and prediction system include unbounded patterns, uneven time lags between activities, data nonstationarity, individuality, collusion attacks, high false alarm rates, class imbalance problem, undetected insider attacks, uncertainty, and the large number of free parameters in the model. To identify the best-to-date insider threat detection and prediction algorithms, our meta-analysis study excludes theoretical papers proposing conceptual algorithms from the 37 selected papers resulting in the selection of 13 papers. We rank the insider threat detection and prediction algorithms presented in the 13 selected papers based on the theoretical merits and the transparency of information. To determine the significance of rank sums, we perform ?the Friedman two-way analysis of variance by ranks? test and ?multiple comparisons between groups or conditions? tests.
    Original languageEnglish
    Pages (from-to)1-29
    Number of pages29
    JournalBig Data Analytics
    Volume1
    Issue number6
    DOIs
    Publication statusPublished (VoR) - 30 Aug 2016

    Keywords

    • Insider threat prediction; Anomaly detection; Machine learning; Cyber security; Individual attacks; Collusion attacks

    Fingerprint

    Dive into the research topics of 'Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis'. Together they form a unique fingerprint.

    Cite this