SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1756
Automatic Insider Threat Detection in E-mail System
Using N-gram Technique
Aishwarya Potu1, Snehal Mane2, Akshay Kondhalkar3, Pooja Talathi4, Aparna Hambarde5
1,2,3,4BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India
5Prof, Dept. of Computer Engineering, KJCOEMR, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Managing organisational cyber security is the
threat that comes from those who operate within the
organisation is one of the greatest challenges .It is becominga
serious and increasing concern and those who have fallen
victim to such attacks suffering significant damagesincluding
reputation and financial. Hence an effective approach for
insider threat detection is necessary. To classify documents in
order to detect and prevent leakage of sensitive data n-gram
frequency is used. In the system for detection of sensitive data
using N-gram technique if the user sending sensitive
information through email to outside network, it will get
verified first on server-side using SHA, N-GRAM andThreshold
based system. And after verification if threat found, the user
gets blocked.
Key Words: Cyber security, Data leakage, Insider threat,
N-gram, SHA, Threshold frequency.
1. INTRODUCTION
The insider threat problem is one that is constantly growing
in magnitude, resulting in significant damage to businesses
and organizations alike. The employees who work in an
organization are often trusted with highly confidential
information such as intellectual property, financial records,
and customer accounts, in order to perform their job. If an
individual should choose to abuse this trust and act
maliciously toward the organization, then their position
within the organization, their knowledge of the
organizational systems, and their ability to access such
materials means that they can pose a serious threat to the
operation of the business. Media has reported and exposed
numerous cases in recent years of both government and
businesses who have beencompromised,whereconfidential
information has been exfiltrated and exposed. The threat
posed by insiders is real, and it requires serious attention by
both organizations and individuals. Capelli et al. from the
Carnegie Mellon University Computer Emergency Response
Team (CMU-CERT) group identified three main groups of
insider threat : information technology sabotage, theft of
intellectual property, and fraud data. Over the years,
technological advancements have meant that the way
organizations conduct business is constantly evolving.Ithas
become a common practice nowadays foremployeestohave
access to large repositories of organization documents
electronically stored on distributed file servers. Many
organizations provide their employees with company
laptops for working while on the move and use e-mail to
organize and schedule appointments. For hosting meetings
across the globe, services such as video conferencing are
frequently used . Employees are constantly connectedtothe
Internet where they can obtain information of anything
that they require for conducting their workload. The
technological advancements could potentiallymakeiteasier
for insiders to attack. One advantage of the organizational
view to this is the capability of capturing activity logs that
may provide insight into the actions ofemployees.Duetothe
sheer volume of activity being conducted by employees
every day, analyzing such activity logs would be infeasible
for any analyst. What is required is a capability to analyze
individual users who conduct business on organizational
systems, to assess when users are behaving normally and
when users are posing a threat.
2. LITERATURE SURVEY
1) Title- Automated Insider Threat Detection System
Using User and Role- Based Profiling Assessment :
In this paper, systematic approach for insider threat
detection and analysis based on the concept of anomaly
detection is presented. The system constructs a tree-
structured profiles with reference to given a large collection
of activity log data that describe individual user activityand
combined role activity. They have constructed a feature set
representation that describes the observations made for
each day and the variations that are exhibited between the
current day and the previously observed days[1].
2) Title- Caught in the Act of an Insider Attack :
In this paper, a systematic approach for insider threat
detection and analysis is presented. The system constructs
a tree-structured profile from activity log data that is
collected on users within the organizationsfor eachuserand
for each role. This allows multiple activity types to be
represented in a unified approach, that helps to support
comparison between different usersandassociated roles[2].
3) Title- Word N-gram Based Classification for Data
Leakage Prevention :
The objective of this paper is to prove the effectiveness of N-
grams to measure the similarity betweenregulardocuments
and existing classified documents. N-grams for data
classification purposes is useable based on using the N-
grams frequency to classifydocumentsinordertodetectand
prevent leakage of sensitive data[3].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1757
4) Title- Automated Big Text Security Classification :
In this paper, they have analyzed a dataset that contains
actual formerly sensitive information annotated at
paragraph granularity. Automated ClassificationEnabled by
Security Similarity (ACESS) penetrates the complexityofbig
text security classification. Approach inthispaperaddresses
the issue by partitioning a large text into smaller groups of
similar paragraphs wherein multiple similarity-based
classification models to predict a paragraph’s security
label[4].
5) Title- Visualizing the Insider Threat: Challenges and
tools for Identifying malicious user activity :
In this paper, a visual analytics approach is proposed to
detect the insider threat. With the help of a detailed activity
visualization, it is possible to the analyst to explore the raw
activity data and to check whether the user poses a threat to
the organisation or not. The topics such as insider threat
research, anomaly detection, and security data visualization
are used. It helps to understand the detection and
visualization which can help with the separation between
the malicious and non-malicious activity[5].
6) Title- Mining Software Component Interactions to
Detect Security Threats at the Architectural Level :
The main objective of this paper is to present an innovative
data mining approach to detect anomalous behavior to
interact among the softwarecomponentsatthearchitectural
level. The EDS (Emergency Deployment System) is a real
world software system which is used to define and evaluate
the research. To detect more sophisticated threats it is
important to monitor and assess theoverall securityposture
of a software system at the architectural level. A use case
driven mining framework is proposed with an adaptive
detection algorithm to identify the potential malicious
threats[6].
7) Title- A Model-Based Approach to Predicting the
Performance of Insider Threat Detection Systems :
In this paper, a Model Based Approach is presented to
predict the confusion matrix between insider threat
detection system alerts and the truth whether the user is an
insider or not. To evaluate a predictive model, datasets into
which insiders have been injected or estimated the actual
performance of the insider threat detection system are
developed. A simple approach for modeling insider threat
detection systems that relies on a small amount of the non
user-specific data is described[7].
8) Title- Cyber security for Product Lifecycle
Management A Research Roadmap :
In this paper, they have discussed present landscape with
respect to the major cyber security risks. They have
introduced a research focusing on cyber security in the
context of product lifecycle management. Itincluderesearch
directions on critical protection techniques, including
protection techniques from insider threat, access control
systems and secure supply chains. AnoverviewofDBSAFE,a
system for protecting data from insider threat is
presented[8].
9) Title- Dynamic Defense Strategy against Advanced
Persistent Threat with Insiders :
In this paper, they have investigated the joint threats from
the APT attacker and insiders over a long time-span within a
general framework. The results in this paper can shade
insights on practical system design for higher securitylevels
facing the joint APT and insider threats[9].
10) Title- Modeling Insider Threat Types in Cyber
Organizations :
In this paper, they have presented a computational
framework to model insiders using relevant cultural, social,
emotional, and other behavioral factors, along with
technological factors, with the goal of categorizing them
based on the type of threat they are likely to present to the
organization. The proposed method provides an efficient
relative measure of each person’s awareness for different
types of manipulations and it captures both short term and
long term factors impacting their awareness[10].
3.1 N-gram Technique
The N-Gram technique is used to break each word in the
document into smaller character N-grams. To create an N-
gram profile, the smaller character n-grams are rearranged
based on the N-gram frequency. The created N-gram profile
are compared with existing category N-gram profiles. The
document are classified underthecategorywiththesmallest
distance measure.
Fig-1: Word N-gram classification process
3. TECHNIQUES
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1758
3.2 SHA
Secure Hash Algorithm 1 (SHA1) is a cryptographic hash
function which is designed by the United States National
Security Agency . SHA-1 produces a 20-byte hash value
known as a message digest. A SHA-1 hash value is a
hexadecimal number i.e 40 digits long. It execute by
transforming the data using a hash function. It uses an
algorithm that consists of modular additions, bitwise
operations and compression functions. A fixed size string
produced by hash function looks nothing like the original.
To be one-way functions the algorithms are designed i.e.
once they are transformed into their respective hash values
then it is virtually impossible to transform them back into
the original data. SHA algorithms are designed and modified
with increasinglystronger encryptiontechnique inresponse
to hacker attacks.
3.3 Threshold Frequency
Threshold is a value. We associate the Threshold to a
statistic. Data is collected for that statistic, then it is
compared with the associated Threshold value. If the
collected data value does not warrant the Threshold value,
then it indicates that this type of data might lead to poor
performance of the network or device. Threshold value is
set up along with a level such as the maximum value, equal
value and the minimum value. When the collected value
exceeds the threshold value,notification,whichwereceiveis
in the form of a Threshold Event. An event is an occurrence
of any action. Whenever a threshold value has exceeded, a
threshold event is generated. Also, every Threshold event is
associated with a Severity to denote how critical the
situation is. The total count number of sensitive word
frequency is compared with threshold value, the log is
maintained and the appropriate action is taken, i.e. in email
system, to block the mail or send it.
4 EXISTING SYSTEM
A tree-structure profiling approach incorporates the details
of activities done by each of the user and job role and then
use this to obtain a consistent representationoffeaturesthat
gives a rich description of the user’s behavior. Deviation can
be assessed with reference to the amount of variance that
each user exhibits across multiple attribute by comparing
against their peers[1].
Following are the requirements of the detection system :
1) The system must be featured in such a way that it
should be able to determine a score for each of the
user that relates to the threat that they currently
pose.
2) The system should be expert to deal with various
forms of insider threat, including sabotage,
intellectual property theft, and fraud data.
3) The System should have the ability to deal with the
unknown cases of insiderthreat,wherebythethreat
is decided to be an anomaly for that user and for
that role.
4) The system also should be able to detect the threat
that an individual poses based on howthis behavior
deviates from both theirown previousbehaviorand
the behavior exhibited by those in a similarjob role.
5 PROPOSED SYSTEM
The main objective of the system is to detect the suspicious
mail sent by the insider threat. The mail is being sent from
client using SOAP (Simple Access Object Protocol). Once it is
received on the server side, JAVA API is usedtosendemailto
particular receipt.
Fig-2: Proposed system scenario
Every authorized registered client will begivenaloginId and
Password to access to the system. On theserversidedatabase
is maintained. The database contains all the sensitive word
list, files and documents. Admin maintains the email logs,
manage block list, manage white list and black list. The
admin has the right to block the user if any illegal activities
are caught
With the reference to the previous work done, the objective
of the project is to develop an application to detect insider
threat in E-mail system. In this system when the user
sending sensitive information to outsidenetworks,itwill get
verified first on server-side using SHA, N- GRAM and
Threshold based system. The log is maintained by Admin.
And after verification if sensitive information found, the
user gets blocked.
6. CONCLUSION
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1759
REFERENCES
[1] “Automated Insider Threat DetectionSystemUsing User
and Role- Based Profiling Assessment”, Philip A. Leg,
Oliver Buckley, Michael Goldsmith, and Sadie Creese,
2015
[2] “Caught in the Act of an Insider Attack: Detection and
Assessment of Insider Threat “, Philip A. Legg, Oliver
Buckley, Michael, Goldsmith and Sadie Creese ,Cyber
Security Centre, University of Oxford, UK. , 2015
[3] “Word N-gram Based Classification for Data Leakage
Prevention”, Sultan Alneyadi, Elankayer Sithirasenan,
Vallipuram Muthukkumarasamy, Faculty of Science,
Environment, Engineering and Technology, Griffith
University Gold Coast Campus, Australia, 2013
[4] “Automated Big Text Security Classification”, Khudran
Alzhrani, Ethan M. Rudd, Terrance E. Boultand C.
Edward Chow, University of Colorado at Colorado
Springs Department of Computer Science Vision and
Security Technology (VAST) Lab, 2015
[5] “Visualizing the Insider Threat: Challenges and tools for
Identifying malicious user activity”, Philip A. Legg, 2015
[6] “Mining Software Component Interactions to Detect
Security Threats at the Architectural Level” , Eric Yuan
And Sam Malek, 2016.
[7] “A Model-Based Approach to Predicting the
Performance of Insider Threat Detection Systems”,
Shannon C. Roberts, John T.Holodnak, Trang Nguyen,
Sophia Yuditskaya, Maja Milosavljevic, William W.
Australian MIT Lincoln Laboratory, 2016
[8] “Cyber security for Product Lifecycle Management A
Research Roadmap”, 2015.
[9] “Dynamic Defense Strategy againstAdvancedPersistent
Threat with Insiders”, Pengfei Hu, Hongxing Li Hao Fu,
Derya Cansever and Prasant Mohapatra, Department of
Computer Science, University of California, Davis, USA
[10] “Modeling Insider ThreatTypesinCyberOrganizations”,
Eunice E. Santosa,c, Eugene Santos Jr. b,d, John Korah
a,e, Jeremy E. Thompson b, Vairavan Murugappana,
Suresh Subramaniana, Yan Zhao B, 2017
[11] P. A. Legg et al., “Towards a conceptual model and
reasoning structure for insider threat detection,” J.
Wireless MobileNetw.,UbiquitousComput., Dependable
Appl., vol. 4, no. 4, pp. 20–37, Dec. 2013.
[12] J. R. C. Nurse et al., “Understanding insider threat: A
framework for characterising attacks,” in Proc. IEEE
SPW, 2014
[13] L. Spitzner, “Honeypots: Catching the insider threat,” in
Proc. 19th IEEE ACSAC, Las Vegas, NV, USA, Dec. 2003
[14] G. B. Magklaras and S. M. Furnell, “Insider threat
prediction tool: Evaluating the probabilityofITmisuse,”
Comput. Security, vol. 21, no. 1, pp. 62–73, 1st Quart.
2002.
[15] J. Myers, M. R. Grimaila, and R. F. Mills, “Towards insider
threat detection using web server logs,” in Proc. 5th
Annu. CSIIRW—Cyber Security Inf. Intell. Challenges
Strategies, New York, NY, USA, 2009
[16] O. Brdiczka et al., “Proactive insider threat detection
through graph learning and psychological context,” in
Proc. IEEE Symp. SPW, San Francisco, CA, USA, May
2012
[17] W. Eberle, J. Graves, and L. Holder, “Insider threat
detection using a graph-based approach,” J. Appl.
Security Res., vol. 6, no. 1, pp. 32–81, Dec. 2010.
[18] “AD2: Anomaly Detection on Active Directory Log Data
for Insider Threat Monitoring”, 2016

Mais conteúdo relacionado

Mais procurados

CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETIJNSA Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...IJAAS Team
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
rpaper
rpaperrpaper
rpaperimu409
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique IRJET Journal
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeCSCJournals
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...Radita Apriana
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios ijcsa
 
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIntrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIJERA Editor
 

Mais procurados (18)

CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
rpaper
rpaperrpaper
rpaper
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
A45010107
A45010107A45010107
A45010107
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
E1802052327
E1802052327E1802052327
E1802052327
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIntrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A Survey
 

Semelhante a Automatic Insider Threat Detection in E-mail System using N-gram Technique

Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET Journal
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Reviewtheijes
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software ReuseIRJET Journal
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...IJCSIS Research Publications
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...IJNSA Journal
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Drjabez
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...IRJET Journal
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET Journal
 
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection AM Publications,India
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 

Semelhante a Automatic Insider Threat Detection in E-mail System using N-gram Technique (20)

Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
IRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial IntelligenceIRJET- Improving Cyber Security using Artificial Intelligence
IRJET- Improving Cyber Security using Artificial Intelligence
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Último (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Automatic Insider Threat Detection in E-mail System using N-gram Technique

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1756 Automatic Insider Threat Detection in E-mail System Using N-gram Technique Aishwarya Potu1, Snehal Mane2, Akshay Kondhalkar3, Pooja Talathi4, Aparna Hambarde5 1,2,3,4BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India 5Prof, Dept. of Computer Engineering, KJCOEMR, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Managing organisational cyber security is the threat that comes from those who operate within the organisation is one of the greatest challenges .It is becominga serious and increasing concern and those who have fallen victim to such attacks suffering significant damagesincluding reputation and financial. Hence an effective approach for insider threat detection is necessary. To classify documents in order to detect and prevent leakage of sensitive data n-gram frequency is used. In the system for detection of sensitive data using N-gram technique if the user sending sensitive information through email to outside network, it will get verified first on server-side using SHA, N-GRAM andThreshold based system. And after verification if threat found, the user gets blocked. Key Words: Cyber security, Data leakage, Insider threat, N-gram, SHA, Threshold frequency. 1. INTRODUCTION The insider threat problem is one that is constantly growing in magnitude, resulting in significant damage to businesses and organizations alike. The employees who work in an organization are often trusted with highly confidential information such as intellectual property, financial records, and customer accounts, in order to perform their job. If an individual should choose to abuse this trust and act maliciously toward the organization, then their position within the organization, their knowledge of the organizational systems, and their ability to access such materials means that they can pose a serious threat to the operation of the business. Media has reported and exposed numerous cases in recent years of both government and businesses who have beencompromised,whereconfidential information has been exfiltrated and exposed. The threat posed by insiders is real, and it requires serious attention by both organizations and individuals. Capelli et al. from the Carnegie Mellon University Computer Emergency Response Team (CMU-CERT) group identified three main groups of insider threat : information technology sabotage, theft of intellectual property, and fraud data. Over the years, technological advancements have meant that the way organizations conduct business is constantly evolving.Ithas become a common practice nowadays foremployeestohave access to large repositories of organization documents electronically stored on distributed file servers. Many organizations provide their employees with company laptops for working while on the move and use e-mail to organize and schedule appointments. For hosting meetings across the globe, services such as video conferencing are frequently used . Employees are constantly connectedtothe Internet where they can obtain information of anything that they require for conducting their workload. The technological advancements could potentiallymakeiteasier for insiders to attack. One advantage of the organizational view to this is the capability of capturing activity logs that may provide insight into the actions ofemployees.Duetothe sheer volume of activity being conducted by employees every day, analyzing such activity logs would be infeasible for any analyst. What is required is a capability to analyze individual users who conduct business on organizational systems, to assess when users are behaving normally and when users are posing a threat. 2. LITERATURE SURVEY 1) Title- Automated Insider Threat Detection System Using User and Role- Based Profiling Assessment : In this paper, systematic approach for insider threat detection and analysis based on the concept of anomaly detection is presented. The system constructs a tree- structured profiles with reference to given a large collection of activity log data that describe individual user activityand combined role activity. They have constructed a feature set representation that describes the observations made for each day and the variations that are exhibited between the current day and the previously observed days[1]. 2) Title- Caught in the Act of an Insider Attack : In this paper, a systematic approach for insider threat detection and analysis is presented. The system constructs a tree-structured profile from activity log data that is collected on users within the organizationsfor eachuserand for each role. This allows multiple activity types to be represented in a unified approach, that helps to support comparison between different usersandassociated roles[2]. 3) Title- Word N-gram Based Classification for Data Leakage Prevention : The objective of this paper is to prove the effectiveness of N- grams to measure the similarity betweenregulardocuments and existing classified documents. N-grams for data classification purposes is useable based on using the N- grams frequency to classifydocumentsinordertodetectand prevent leakage of sensitive data[3].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1757 4) Title- Automated Big Text Security Classification : In this paper, they have analyzed a dataset that contains actual formerly sensitive information annotated at paragraph granularity. Automated ClassificationEnabled by Security Similarity (ACESS) penetrates the complexityofbig text security classification. Approach inthispaperaddresses the issue by partitioning a large text into smaller groups of similar paragraphs wherein multiple similarity-based classification models to predict a paragraph’s security label[4]. 5) Title- Visualizing the Insider Threat: Challenges and tools for Identifying malicious user activity : In this paper, a visual analytics approach is proposed to detect the insider threat. With the help of a detailed activity visualization, it is possible to the analyst to explore the raw activity data and to check whether the user poses a threat to the organisation or not. The topics such as insider threat research, anomaly detection, and security data visualization are used. It helps to understand the detection and visualization which can help with the separation between the malicious and non-malicious activity[5]. 6) Title- Mining Software Component Interactions to Detect Security Threats at the Architectural Level : The main objective of this paper is to present an innovative data mining approach to detect anomalous behavior to interact among the softwarecomponentsatthearchitectural level. The EDS (Emergency Deployment System) is a real world software system which is used to define and evaluate the research. To detect more sophisticated threats it is important to monitor and assess theoverall securityposture of a software system at the architectural level. A use case driven mining framework is proposed with an adaptive detection algorithm to identify the potential malicious threats[6]. 7) Title- A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems : In this paper, a Model Based Approach is presented to predict the confusion matrix between insider threat detection system alerts and the truth whether the user is an insider or not. To evaluate a predictive model, datasets into which insiders have been injected or estimated the actual performance of the insider threat detection system are developed. A simple approach for modeling insider threat detection systems that relies on a small amount of the non user-specific data is described[7]. 8) Title- Cyber security for Product Lifecycle Management A Research Roadmap : In this paper, they have discussed present landscape with respect to the major cyber security risks. They have introduced a research focusing on cyber security in the context of product lifecycle management. Itincluderesearch directions on critical protection techniques, including protection techniques from insider threat, access control systems and secure supply chains. AnoverviewofDBSAFE,a system for protecting data from insider threat is presented[8]. 9) Title- Dynamic Defense Strategy against Advanced Persistent Threat with Insiders : In this paper, they have investigated the joint threats from the APT attacker and insiders over a long time-span within a general framework. The results in this paper can shade insights on practical system design for higher securitylevels facing the joint APT and insider threats[9]. 10) Title- Modeling Insider Threat Types in Cyber Organizations : In this paper, they have presented a computational framework to model insiders using relevant cultural, social, emotional, and other behavioral factors, along with technological factors, with the goal of categorizing them based on the type of threat they are likely to present to the organization. The proposed method provides an efficient relative measure of each person’s awareness for different types of manipulations and it captures both short term and long term factors impacting their awareness[10]. 3.1 N-gram Technique The N-Gram technique is used to break each word in the document into smaller character N-grams. To create an N- gram profile, the smaller character n-grams are rearranged based on the N-gram frequency. The created N-gram profile are compared with existing category N-gram profiles. The document are classified underthecategorywiththesmallest distance measure. Fig-1: Word N-gram classification process 3. TECHNIQUES
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1758 3.2 SHA Secure Hash Algorithm 1 (SHA1) is a cryptographic hash function which is designed by the United States National Security Agency . SHA-1 produces a 20-byte hash value known as a message digest. A SHA-1 hash value is a hexadecimal number i.e 40 digits long. It execute by transforming the data using a hash function. It uses an algorithm that consists of modular additions, bitwise operations and compression functions. A fixed size string produced by hash function looks nothing like the original. To be one-way functions the algorithms are designed i.e. once they are transformed into their respective hash values then it is virtually impossible to transform them back into the original data. SHA algorithms are designed and modified with increasinglystronger encryptiontechnique inresponse to hacker attacks. 3.3 Threshold Frequency Threshold is a value. We associate the Threshold to a statistic. Data is collected for that statistic, then it is compared with the associated Threshold value. If the collected data value does not warrant the Threshold value, then it indicates that this type of data might lead to poor performance of the network or device. Threshold value is set up along with a level such as the maximum value, equal value and the minimum value. When the collected value exceeds the threshold value,notification,whichwereceiveis in the form of a Threshold Event. An event is an occurrence of any action. Whenever a threshold value has exceeded, a threshold event is generated. Also, every Threshold event is associated with a Severity to denote how critical the situation is. The total count number of sensitive word frequency is compared with threshold value, the log is maintained and the appropriate action is taken, i.e. in email system, to block the mail or send it. 4 EXISTING SYSTEM A tree-structure profiling approach incorporates the details of activities done by each of the user and job role and then use this to obtain a consistent representationoffeaturesthat gives a rich description of the user’s behavior. Deviation can be assessed with reference to the amount of variance that each user exhibits across multiple attribute by comparing against their peers[1]. Following are the requirements of the detection system : 1) The system must be featured in such a way that it should be able to determine a score for each of the user that relates to the threat that they currently pose. 2) The system should be expert to deal with various forms of insider threat, including sabotage, intellectual property theft, and fraud data. 3) The System should have the ability to deal with the unknown cases of insiderthreat,wherebythethreat is decided to be an anomaly for that user and for that role. 4) The system also should be able to detect the threat that an individual poses based on howthis behavior deviates from both theirown previousbehaviorand the behavior exhibited by those in a similarjob role. 5 PROPOSED SYSTEM The main objective of the system is to detect the suspicious mail sent by the insider threat. The mail is being sent from client using SOAP (Simple Access Object Protocol). Once it is received on the server side, JAVA API is usedtosendemailto particular receipt. Fig-2: Proposed system scenario Every authorized registered client will begivenaloginId and Password to access to the system. On theserversidedatabase is maintained. The database contains all the sensitive word list, files and documents. Admin maintains the email logs, manage block list, manage white list and black list. The admin has the right to block the user if any illegal activities are caught With the reference to the previous work done, the objective of the project is to develop an application to detect insider threat in E-mail system. In this system when the user sending sensitive information to outsidenetworks,itwill get verified first on server-side using SHA, N- GRAM and Threshold based system. The log is maintained by Admin. And after verification if sensitive information found, the user gets blocked. 6. CONCLUSION
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1759 REFERENCES [1] “Automated Insider Threat DetectionSystemUsing User and Role- Based Profiling Assessment”, Philip A. Leg, Oliver Buckley, Michael Goldsmith, and Sadie Creese, 2015 [2] “Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat “, Philip A. Legg, Oliver Buckley, Michael, Goldsmith and Sadie Creese ,Cyber Security Centre, University of Oxford, UK. , 2015 [3] “Word N-gram Based Classification for Data Leakage Prevention”, Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy, Faculty of Science, Environment, Engineering and Technology, Griffith University Gold Coast Campus, Australia, 2013 [4] “Automated Big Text Security Classification”, Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boultand C. Edward Chow, University of Colorado at Colorado Springs Department of Computer Science Vision and Security Technology (VAST) Lab, 2015 [5] “Visualizing the Insider Threat: Challenges and tools for Identifying malicious user activity”, Philip A. Legg, 2015 [6] “Mining Software Component Interactions to Detect Security Threats at the Architectural Level” , Eric Yuan And Sam Malek, 2016. [7] “A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems”, Shannon C. Roberts, John T.Holodnak, Trang Nguyen, Sophia Yuditskaya, Maja Milosavljevic, William W. Australian MIT Lincoln Laboratory, 2016 [8] “Cyber security for Product Lifecycle Management A Research Roadmap”, 2015. [9] “Dynamic Defense Strategy againstAdvancedPersistent Threat with Insiders”, Pengfei Hu, Hongxing Li Hao Fu, Derya Cansever and Prasant Mohapatra, Department of Computer Science, University of California, Davis, USA [10] “Modeling Insider ThreatTypesinCyberOrganizations”, Eunice E. Santosa,c, Eugene Santos Jr. b,d, John Korah a,e, Jeremy E. Thompson b, Vairavan Murugappana, Suresh Subramaniana, Yan Zhao B, 2017 [11] P. A. Legg et al., “Towards a conceptual model and reasoning structure for insider threat detection,” J. Wireless MobileNetw.,UbiquitousComput., Dependable Appl., vol. 4, no. 4, pp. 20–37, Dec. 2013. [12] J. R. C. Nurse et al., “Understanding insider threat: A framework for characterising attacks,” in Proc. IEEE SPW, 2014 [13] L. Spitzner, “Honeypots: Catching the insider threat,” in Proc. 19th IEEE ACSAC, Las Vegas, NV, USA, Dec. 2003 [14] G. B. Magklaras and S. M. Furnell, “Insider threat prediction tool: Evaluating the probabilityofITmisuse,” Comput. Security, vol. 21, no. 1, pp. 62–73, 1st Quart. 2002. [15] J. Myers, M. R. Grimaila, and R. F. Mills, “Towards insider threat detection using web server logs,” in Proc. 5th Annu. CSIIRW—Cyber Security Inf. Intell. Challenges Strategies, New York, NY, USA, 2009 [16] O. Brdiczka et al., “Proactive insider threat detection through graph learning and psychological context,” in Proc. IEEE Symp. SPW, San Francisco, CA, USA, May 2012 [17] W. Eberle, J. Graves, and L. Holder, “Insider threat detection using a graph-based approach,” J. Appl. Security Res., vol. 6, no. 1, pp. 32–81, Dec. 2010. [18] “AD2: Anomaly Detection on Active Directory Log Data for Insider Threat Monitoring”, 2016