Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media

In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2018-01, Vol.2018 (2018), p.1-8
Hauptverfasser: Park, Won, Lee, Kyungho, You, Youngin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8
container_issue 2018
container_start_page 1
container_title Security and communication networks
container_volume 2018
creator Park, Won
Lee, Kyungho
You, Youngin
description In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.
doi_str_mv 10.1155/2018/7243296
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786486</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786486</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</originalsourceid><addsrcrecordid>eNqF0M1Kw0AQB_BFFKzVm2dZ8Kix-53EW2mrFioKrScPYbPZtVvapO5u0XryNXw9n8SEFD16mRmYH8PwB-AUoyuMOe8RhJNeTBglqdgDHZzSNEKYkP3fGbNDcOT9AiGBWcw64Hmog1bBli_wsQq6DFYu4bj0ttAOzuZOy3AN-6Vcbj8as9v4788vOG30qi5w9L6uvC6gLeG0Us2Fe11YeQwOjFx6fbLrXfB0M5oN7qLJw-140J9EigoUIqxEToo854k0UhiGlJSGGJbHiCOlk4QpJmIUUyQpVbXLU04pVoxTohRStAvO27trV71utA_Zotq4-mefEcZ5nAiWiFpdtkq5ynunTbZ2diXdNsMoa-LLmviyXXw1v2j53JaFfLP_6bNW69poI_80wYxSRH8AcMN59A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786486</pqid></control><display><type>article</type><title>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Park, Won ; Lee, Kyungho ; You, Youngin</creator><contributor>You, Ilsun</contributor><creatorcontrib>Park, Won ; Lee, Kyungho ; You, Youngin ; You, Ilsun</creatorcontrib><description>In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2018/7243296</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Accuracy ; Algorithms ; Communication ; Data encryption ; Data mining ; Datasets ; Decision analysis ; Decision trees ; Dictionaries ; Digital media ; Internet of Things ; Machine learning ; Principal components analysis ; Psychological aspects ; Sentiment analysis ; Social networks ; Social research ; Threats ; User profiles ; Web services ; Wireless networks</subject><ispartof>Security and communication networks, 2018-01, Vol.2018 (2018), p.1-8</ispartof><rights>Copyright © 2018 Won Park et al.</rights><rights>Copyright © 2018 Won Park et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</citedby><cites>FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</cites><orcidid>0000-0001-7643-388X ; 0000-0002-1214-9596 ; 0000-0002-5183-5927</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>You, Ilsun</contributor><creatorcontrib>Park, Won</creatorcontrib><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>You, Youngin</creatorcontrib><title>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</title><title>Security and communication networks</title><description>In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Communication</subject><subject>Data encryption</subject><subject>Data mining</subject><subject>Datasets</subject><subject>Decision analysis</subject><subject>Decision trees</subject><subject>Dictionaries</subject><subject>Digital media</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Principal components analysis</subject><subject>Psychological aspects</subject><subject>Sentiment analysis</subject><subject>Social networks</subject><subject>Social research</subject><subject>Threats</subject><subject>User profiles</subject><subject>Web services</subject><subject>Wireless networks</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0M1Kw0AQB_BFFKzVm2dZ8Kix-53EW2mrFioKrScPYbPZtVvapO5u0XryNXw9n8SEFD16mRmYH8PwB-AUoyuMOe8RhJNeTBglqdgDHZzSNEKYkP3fGbNDcOT9AiGBWcw64Hmog1bBli_wsQq6DFYu4bj0ttAOzuZOy3AN-6Vcbj8as9v4788vOG30qi5w9L6uvC6gLeG0Us2Fe11YeQwOjFx6fbLrXfB0M5oN7qLJw-140J9EigoUIqxEToo854k0UhiGlJSGGJbHiCOlk4QpJmIUUyQpVbXLU04pVoxTohRStAvO27trV71utA_Zotq4-mefEcZ5nAiWiFpdtkq5ynunTbZ2diXdNsMoa-LLmviyXXw1v2j53JaFfLP_6bNW69poI_80wYxSRH8AcMN59A</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Park, Won</creator><creator>Lee, Kyungho</creator><creator>You, Youngin</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-7643-388X</orcidid><orcidid>https://orcid.org/0000-0002-1214-9596</orcidid><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid></search><sort><creationdate>20180101</creationdate><title>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</title><author>Park, Won ; Lee, Kyungho ; You, Youngin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Communication</topic><topic>Data encryption</topic><topic>Data mining</topic><topic>Datasets</topic><topic>Decision analysis</topic><topic>Decision trees</topic><topic>Dictionaries</topic><topic>Digital media</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Principal components analysis</topic><topic>Psychological aspects</topic><topic>Sentiment analysis</topic><topic>Social networks</topic><topic>Social research</topic><topic>Threats</topic><topic>User profiles</topic><topic>Web services</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Park, Won</creatorcontrib><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>You, Youngin</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Park, Won</au><au>Lee, Kyungho</au><au>You, Youngin</au><au>You, Ilsun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</atitle><jtitle>Security and communication networks</jtitle><date>2018-01-01</date><risdate>2018</risdate><volume>2018</volume><issue>2018</issue><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2018/7243296</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0001-7643-388X</orcidid><orcidid>https://orcid.org/0000-0002-1214-9596</orcidid><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2018-01, Vol.2018 (2018), p.1-8
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455786486
source Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Accuracy
Algorithms
Communication
Data encryption
Data mining
Datasets
Decision analysis
Decision trees
Dictionaries
Digital media
Internet of Things
Machine learning
Principal components analysis
Psychological aspects
Sentiment analysis
Social networks
Social research
Threats
User profiles
Web services
Wireless networks
title Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T19%3A18%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detecting%20Potential%20Insider%20Threat:%20Analyzing%20Insiders%E2%80%99%20Sentiment%20Exposed%20in%20Social%20Media&rft.jtitle=Security%20and%20communication%20networks&rft.au=Park,%20Won&rft.date=2018-01-01&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2018/7243296&rft_dat=%3Cproquest_cross%3E2455786486%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455786486&rft_id=info:pmid/&rfr_iscdi=true