A Stacked Ensemble Framework for Detecting Malicious Insiders

Abstract

One of the mainstream strategies identified for detecting Malicious Insider Threat (MIT) is building stacking ensemble Machine Learning (ML) models to reveal malevolent insider activities through anomalies in user activities. However, most anomalies found by these learning models were not malicious because MIT was treated as a single entity, whereas there are various forms of this threat with their own distinct signature. To address this deficiency, this study focused on designing a stacked ensemble framework for detecting malicious insider threat which utilizes a one scenario per algorithm strategy. A model that can be used to test the framework was proposed.

Authors and Affiliations

Abolaji B. Akanbi, Adewale O. Adebayo, Sunday A. Idowu, Ebunoluwa E. Okediran

Keywords

Related Articles

An Analysis of Vermicomposting in Agriculture

massive amount of solid garbage generated across world is a serious biological & technical issue. Vermicomposting might be feasible solution for ecologically friendly solid waste management. This article gives a broad o...

Smart Grid Application Useing Iot

Smart cities are a natural extension of the sensible grid concept, and their implementation is inextricably linked to legacy power system transformation. Clients can utilize brilliant matrix innovations to plan loads at...

A Compact 4 Port MIMO Diversified Antenna for X-Band Applications

Antennas Currently there is large scope in wireless applications due to increased scalability and mobility. Users need these technologies to improve data accessing information from anywhere along with high data speed giv...

Robust Digital Data Hiding in Low Coefficient Region of Image

Digital images have many uses in the field of health, research, military, art, etc. Digital Images need annotation for retrieval and protection from piracy, attacks, and modification. To perform this retrieval and protec...

A Password and Least Significant Bit Substitution Based Steganography Technique for Image Hiding

The proposed work introduces an image steganography technique using text-based password that acts as the symmetric key of encryption and decryption. It contains two components, an encoder, and a decoder. An encoder takes...

Download PDF file
  • EP ID EP747774
  • DOI 10.21276/ijircst.2020.8.4.8
  • Views 1
  • Downloads 0

How To Cite

Abolaji B. Akanbi, Adewale O. Adebayo, Sunday A. Idowu, Ebunoluwa E. Okediran (2020). A Stacked Ensemble Framework for Detecting Malicious Insiders. International Journal of Innovative Research in Computer Science and Technology, 8(4), -. https://europub.co.uk/articles/-A-747774