Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review

Ayshwarya Jaiswal,Pragya Dwivedi,Rupesh Kumar Dewang
DOI: https://doi.org/10.1007/s11042-024-20273-0
IF: 2.577
2024-10-05
Multimedia Tools and Applications
Abstract:Insider threats are profoundly damaging and pose serious security challenges. These threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as ambition for success, recognition, financial gain, or knowledge acquisition. They manifest in various forms; for example, an insider might disrupt systems by inserting a malicious script or engage in intellectual property theft. Due to their diverse nature, detection is highly complex and challenging, as standard security devices such as intrusion detection systems, firewalls, or antivirus software cannot detect it; hence, it entails careful and diligent work. This survey reviews existing research between 2010 and 2024 on detecting insider threats. It not only expounds on the novel taxonomy based on previous works and diverse motivations for insider threats but also identifies challenges and gaps in detecting malicious insiders. It highlights the state-of-the-art tools, techniques, and methodologies and also discusses the limitations of the same. Finally, the paper provides an overview of identifying optimal solutions and discusses future research directions that could lead to new methods for detecting insider threats.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?