Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sen...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2018-01, Vol.2018 (2018), p.1-8 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 8 |
---|---|
container_issue | 2018 |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2018 |
creator | Park, Won Lee, Kyungho You, Youngin |
description | In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior. |
doi_str_mv | 10.1155/2018/7243296 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455786486</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455786486</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</originalsourceid><addsrcrecordid>eNqF0M1Kw0AQB_BFFKzVm2dZ8Kix-53EW2mrFioKrScPYbPZtVvapO5u0XryNXw9n8SEFD16mRmYH8PwB-AUoyuMOe8RhJNeTBglqdgDHZzSNEKYkP3fGbNDcOT9AiGBWcw64Hmog1bBli_wsQq6DFYu4bj0ttAOzuZOy3AN-6Vcbj8as9v4788vOG30qi5w9L6uvC6gLeG0Us2Fe11YeQwOjFx6fbLrXfB0M5oN7qLJw-140J9EigoUIqxEToo854k0UhiGlJSGGJbHiCOlk4QpJmIUUyQpVbXLU04pVoxTohRStAvO27trV71utA_Zotq4-mefEcZ5nAiWiFpdtkq5ynunTbZ2diXdNsMoa-LLmviyXXw1v2j53JaFfLP_6bNW69poI_80wYxSRH8AcMN59A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455786486</pqid></control><display><type>article</type><title>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</title><source>Wiley Online Library Open Access</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Park, Won ; Lee, Kyungho ; You, Youngin</creator><contributor>You, Ilsun</contributor><creatorcontrib>Park, Won ; Lee, Kyungho ; You, Youngin ; You, Ilsun</creatorcontrib><description>In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2018/7243296</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Accuracy ; Algorithms ; Communication ; Data encryption ; Data mining ; Datasets ; Decision analysis ; Decision trees ; Dictionaries ; Digital media ; Internet of Things ; Machine learning ; Principal components analysis ; Psychological aspects ; Sentiment analysis ; Social networks ; Social research ; Threats ; User profiles ; Web services ; Wireless networks</subject><ispartof>Security and communication networks, 2018-01, Vol.2018 (2018), p.1-8</ispartof><rights>Copyright © 2018 Won Park et al.</rights><rights>Copyright © 2018 Won Park et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</citedby><cites>FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</cites><orcidid>0000-0001-7643-388X ; 0000-0002-1214-9596 ; 0000-0002-5183-5927</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>You, Ilsun</contributor><creatorcontrib>Park, Won</creatorcontrib><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>You, Youngin</creatorcontrib><title>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</title><title>Security and communication networks</title><description>In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Communication</subject><subject>Data encryption</subject><subject>Data mining</subject><subject>Datasets</subject><subject>Decision analysis</subject><subject>Decision trees</subject><subject>Dictionaries</subject><subject>Digital media</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Principal components analysis</subject><subject>Psychological aspects</subject><subject>Sentiment analysis</subject><subject>Social networks</subject><subject>Social research</subject><subject>Threats</subject><subject>User profiles</subject><subject>Web services</subject><subject>Wireless networks</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNqF0M1Kw0AQB_BFFKzVm2dZ8Kix-53EW2mrFioKrScPYbPZtVvapO5u0XryNXw9n8SEFD16mRmYH8PwB-AUoyuMOe8RhJNeTBglqdgDHZzSNEKYkP3fGbNDcOT9AiGBWcw64Hmog1bBli_wsQq6DFYu4bj0ttAOzuZOy3AN-6Vcbj8as9v4788vOG30qi5w9L6uvC6gLeG0Us2Fe11YeQwOjFx6fbLrXfB0M5oN7qLJw-140J9EigoUIqxEToo854k0UhiGlJSGGJbHiCOlk4QpJmIUUyQpVbXLU04pVoxTohRStAvO27trV71utA_Zotq4-mefEcZ5nAiWiFpdtkq5ynunTbZ2diXdNsMoa-LLmviyXXw1v2j53JaFfLP_6bNW69poI_80wYxSRH8AcMN59A</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Park, Won</creator><creator>Lee, Kyungho</creator><creator>You, Youngin</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-7643-388X</orcidid><orcidid>https://orcid.org/0000-0002-1214-9596</orcidid><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid></search><sort><creationdate>20180101</creationdate><title>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</title><author>Park, Won ; Lee, Kyungho ; You, Youngin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-1c6b2dbb58afa6f40caaf2f4b7050ce884c4670730a33cbb5b95331c4532cc0c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Communication</topic><topic>Data encryption</topic><topic>Data mining</topic><topic>Datasets</topic><topic>Decision analysis</topic><topic>Decision trees</topic><topic>Dictionaries</topic><topic>Digital media</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Principal components analysis</topic><topic>Psychological aspects</topic><topic>Sentiment analysis</topic><topic>Social networks</topic><topic>Social research</topic><topic>Threats</topic><topic>User profiles</topic><topic>Web services</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Park, Won</creatorcontrib><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>You, Youngin</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Park, Won</au><au>Lee, Kyungho</au><au>You, Youngin</au><au>You, Ilsun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media</atitle><jtitle>Security and communication networks</jtitle><date>2018-01-01</date><risdate>2018</risdate><volume>2018</volume><issue>2018</issue><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2018/7243296</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0001-7643-388X</orcidid><orcidid>https://orcid.org/0000-0002-1214-9596</orcidid><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2018-01, Vol.2018 (2018), p.1-8 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455786486 |
source | Wiley Online Library Open Access; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Accuracy Algorithms Communication Data encryption Data mining Datasets Decision analysis Decision trees Dictionaries Digital media Internet of Things Machine learning Principal components analysis Psychological aspects Sentiment analysis Social networks Social research Threats User profiles Web services Wireless networks |
title | Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T19%3A18%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detecting%20Potential%20Insider%20Threat:%20Analyzing%20Insiders%E2%80%99%20Sentiment%20Exposed%20in%20Social%20Media&rft.jtitle=Security%20and%20communication%20networks&rft.au=Park,%20Won&rft.date=2018-01-01&rft.volume=2018&rft.issue=2018&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2018/7243296&rft_dat=%3Cproquest_cross%3E2455786486%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455786486&rft_id=info:pmid/&rfr_iscdi=true |