It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
This study examines the formidable and complex challenge of insider threats to organizational security, addressing risks such as ransomware incidents, data breaches, and extortion attempts. The research involves six experiments utilizing email, HTTP, and file content data. To combat insider threats, emerging Natural Language Processing techniques are employed in conjunction with powerful Machine Learning classifiers, specifically XGBoost and AdaBoost. The focus is on recognizing the sentiment and context of malicious actions, which are considered less prone to change compared to commonly tracked metrics like location and time of access. To enhance detection, a term frequency-inverse document frequency-based approach is introduced, providing a more robust, adaptable, and maintainable method. Moreover, the study acknowledges the significant impact of hyperparameter selection on classifier performance and employs various contemporary optimizers, including a modified version of the red fox optimization algorithm. The proposed approach undergoes testing in three simulated scenarios using a public dataset, showcasing commendable outcomes.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 ICT College of vocational studies, Belgrade, Belgrade, Serbia
2 Faculty of Informatics and Computing, Singidunum University, Belgrade, Serbia (GRID:grid.445150.1) (ISNI:0000 0004 0466 4357)
3 University of Belgrade, Faculty of Transport and Traffic Engineering, Belgrade, Serbia (GRID:grid.7149.b) (ISNI:0000 0001 2166 9385); Department of Industrial Engineering and Management, Yuan Ze University, College of Engineering, Taoyuan City, Taiwan (GRID:grid.413050.3) (ISNI:0000 0004 1770 3669); Korea University, Department of Computer Science and Engineering, College of Informatics, Seoul, Republic of Korea (GRID:grid.222754.4) (ISNI:0000 0001 0840 2678)
4 Faculty of Informatics and Computing, Singidunum University, Belgrade, Serbia (GRID:grid.445150.1) (ISNI:0000 0004 0466 4357); Saveetha School of Engineering, SIMATS, Department of Mathematics, Chennai, India (GRID:grid.412431.1) (ISNI:0000 0004 0444 045X); Middle East University, MEU Research Unit, Amman, Jordan (GRID:grid.449114.d) (ISNI:0000 0004 0457 5303)
5 University of Belgrade, School of Electrical Engineering, Belgrade, Serbia (GRID:grid.7149.b) (ISNI:0000 0001 2166 9385)