« Previous Article
Next Article »

Original Research 


A Systematic Approach to Develop an Advanced Insider Attacks Detection Module

Keshav Kaushik.

Abstract
The insider threat is one of the most moving issues to identify because of its perplexing nature and huge effect on associations. Insiders represent an extraordinary threat to associations because of their insight on the association and its security conventions, their approved access to the association's assets, and the trouble of perceiving the conduct of an insider threat from an ordinary representative's conduct. Thus, the insider-threat field faces the test of creating recognition arrangements that can identify threats without producing an incredible number of bogus positives and can mull over the non-specialized part of the issue. A possibility to concentrate on threat location was led to assess the recognition execution of the proposed arrangement and its ease of use. The field can profit from our proposed systematic approach that is scientific classification and novel arrangement of research that adds to the association and disambiguation of insider threat occurrences and the protection arrangements utilized against them. Clients with genuine access to delicate and confidential information have been authorized by insiders, who may know about the vulnerabilities of the systems and business types submitted. Numerous cyber-attacks brought about by malicious insiders are progressively hard to recognize contrasted with those of outside assailants whose impressions are more enthusiastically to cover up. The paper aims to propose a systematic approach to develop an advanced insider attacks detection module. The approach proposed in this paper will help the organization to early detect the insider threat and help them in performing more effectively in cyberspace.

Key words: insider threat; malicious insider; cyber-security; cyber-attacks; vulnerability; threat; fraud; keylogger;


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Keshav Kaushik
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Keshav Kaushik. A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. JE&AS. 2021; 8(1): 33-41. doi:10.5455/jeas.2021050104


Web Style

Keshav Kaushik. A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. https://jecasmu.org/?mno=35946 [Access: January 02, 2024]. doi:10.5455/jeas.2021050104


AMA (American Medical Association) Style

Keshav Kaushik. A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. JE&AS. 2021; 8(1): 33-41. doi:10.5455/jeas.2021050104



Vancouver/ICMJE Style

Keshav Kaushik. A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. JE&AS. (2021), [cited January 02, 2024]; 8(1): 33-41. doi:10.5455/jeas.2021050104



Harvard Style

Keshav Kaushik (2021) A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. JE&AS, 8 (1), 33-41. doi:10.5455/jeas.2021050104



Turabian Style

Keshav Kaushik. 2021. A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. Journal of Engineering and Applied Sciences-JE&AS, 8 (1), 33-41. doi:10.5455/jeas.2021050104



Chicago Style

Keshav Kaushik. "A Systematic Approach to Develop an Advanced Insider Attacks Detection Module." Journal of Engineering and Applied Sciences-JE&AS 8 (2021), 33-41. doi:10.5455/jeas.2021050104



MLA (The Modern Language Association) Style

Keshav Kaushik. "A Systematic Approach to Develop an Advanced Insider Attacks Detection Module." Journal of Engineering and Applied Sciences-JE&AS 8.1 (2021), 33-41. Print. doi:10.5455/jeas.2021050104



APA (American Psychological Association) Style

Keshav Kaushik (2021) A Systematic Approach to Develop an Advanced Insider Attacks Detection Module. Journal of Engineering and Applied Sciences-JE&AS, 8 (1), 33-41. doi:10.5455/jeas.2021050104