Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sen...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2018/7243296 |
id |
doaj-f10ea21e2ba44d6191eaf6b68a416a33 |
---|---|
record_format |
Article |
spelling |
doaj-f10ea21e2ba44d6191eaf6b68a416a332020-11-24T23:34:34ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/72432967243296Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social MediaWon Park0Youngin You1Kyungho Lee2Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of KoreaInstitute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of KoreaInstitute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of KoreaIn the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.http://dx.doi.org/10.1155/2018/7243296 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Won Park Youngin You Kyungho Lee |
spellingShingle |
Won Park Youngin You Kyungho Lee Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media Security and Communication Networks |
author_facet |
Won Park Youngin You Kyungho Lee |
author_sort |
Won Park |
title |
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media |
title_short |
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media |
title_full |
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media |
title_fullStr |
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media |
title_full_unstemmed |
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media |
title_sort |
detecting potential insider threat: analyzing insiders’ sentiment exposed in social media |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2018-01-01 |
description |
In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior. |
url |
http://dx.doi.org/10.1155/2018/7243296 |
work_keys_str_mv |
AT wonpark detectingpotentialinsiderthreatanalyzinginsiderssentimentexposedinsocialmedia AT younginyou detectingpotentialinsiderthreatanalyzinginsiderssentimentexposedinsocialmedia AT kyungholee detectingpotentialinsiderthreatanalyzinginsiderssentimentexposedinsocialmedia |
_version_ |
1725528828357378048 |