This study proposes a scheme to identify insider threats in nuclear facilities through the detection of malicious intentions of potential insiders using subject-wise classification. Based on electroencephalography (EEG) signals, a classification model was developed to identify whether a subject has a malicious intention under scenarios of being forced to become an insider threat. The model also distinguishes insider threat scenarios from everyday conflict scenarios. To support model development, 21-channel EEG signals were measured on 25 healthy subjects, and sets of features were extracted from the time, time-frequency, frequency and nonlinear domains. To select the best use of the available features, automatic selection was performed by random-forest-based algorithms. The k-nearest neighbor, support vector machine with radial kernel, naïve Bayes, and multilayer perceptron algorithms were applied for the classification. By using EEG signals obtained while contemplating becoming an insider threat, the subject-wise model identified malicious intentions with 78.57% accuracy. The model also distinguished insider threat scenarios from everyday conflict scenarios with 93.47% accuracy. These findings could be utilized to support the development of insider threat mitigation systems along with existing trustworthiness assessments in the nuclear industry.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7664688 | PMC |
http://dx.doi.org/10.3390/s20216365 | DOI Listing |
BMC Med Inform Decis Mak
November 2024
Centre of Excellence in Artificial Intelligence COE-AI, Bahria University, Islamabad, Pakistan.
Background: Anomaly detection is crucial in healthcare data due to challenges associated with the integration of smart technologies and healthcare. Anomaly in electronic health record can be associated with an insider trying to access and manipulate the data. This article focuses around the anomalies under different contexts.
View Article and Find Full Text PDFACS Omega
November 2024
Radiochemistry Division, Bhabha Atomic Research Centre, Trombay, Mumbai 400085, India.
Insufficient inventory control arising from inadequate monitoring procedures can lead to vulnerabilities in nuclear security. In addition, insider threats, by either malicious intent or negligence, can pose a substantial risk by exploiting such deficiencies to perform unlawful actions, such as theft or diversion, which may lead to compromised nuclear security. Interim storage barrels, intended for temporary containment of low-density nuclear waste, require special attention in this regard.
View Article and Find Full Text PDFSci Rep
October 2024
Faculty of Informatics and Computing, Singidunum University, Belgrade, 11000, Serbia.
This study examines the formidable and complex challenge of insider threats to organizational security, addressing risks such as ransomware incidents, data breaches, and extortion attempts. The research involves six experiments utilizing email, HTTP, and file content data. To combat insider threats, emerging Natural Language Processing techniques are employed in conjunction with powerful Machine Learning classifiers, specifically XGBoost and AdaBoost.
View Article and Find Full Text PDFSci Rep
October 2024
College of Computing and Information Technology, University of Doha for Science and Technology, Doha, Qatar.
Insider threats pose a significant challenge in cybersecurity, demanding advanced detection methods for effective risk mitigation. This paper presents a comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection. Specifically, we integrate Convolutional Neural Networks (CNN) with three popular data imbalance addressing techniques: Synthetic Minority Over-sampling Technique (SMOTE), Borderline-SMOTE, and Adaptive Synthetic Sampling (ADASYN).
View Article and Find Full Text PDFHeliyon
September 2024
Master of Business Administration, Faculty of Graduate Studies, An-Najah National University, Nablus, Palestine.
Cybersecurity continues to be an important concern for financial institutions given the technology's rapid development and increasing adoption of digital services. Effective safety measures must be adopted to safeguard sensitive financial data and protect clients from potential harm due to the rise in cyber threats that target digital organizations. The aim of this study is to investigates how machine learning algorithms are integrated into cyber security measures in the context of digital banking and its benefits and drawbacks.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!