Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media

In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sen...

Full description

Bibliographic Details
Main Authors: Won Park, Youngin You, Kyungho Lee
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2018/7243296
id doaj-f10ea21e2ba44d6191eaf6b68a416a33
record_format Article
spelling doaj-f10ea21e2ba44d6191eaf6b68a416a332020-11-24T23:34:34ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/72432967243296Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social MediaWon Park0Youngin You1Kyungho Lee2Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of KoreaInstitute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of KoreaInstitute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of KoreaIn the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.http://dx.doi.org/10.1155/2018/7243296
collection DOAJ
language English
format Article
sources DOAJ
author Won Park
Youngin You
Kyungho Lee
spellingShingle Won Park
Youngin You
Kyungho Lee
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
Security and Communication Networks
author_facet Won Park
Youngin You
Kyungho Lee
author_sort Won Park
title Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
title_short Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
title_full Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
title_fullStr Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
title_full_unstemmed Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
title_sort detecting potential insider threat: analyzing insiders’ sentiment exposed in social media
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2018-01-01
description In the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service “Sentiment140” was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software “Weka (Waikato Environment for Knowledge Analysis)” were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual’s characteristics to the previous studies such as analyzing system behavior.
url http://dx.doi.org/10.1155/2018/7243296
work_keys_str_mv AT wonpark detectingpotentialinsiderthreatanalyzinginsiderssentimentexposedinsocialmedia
AT younginyou detectingpotentialinsiderthreatanalyzinginsiderssentimentexposedinsocialmedia
AT kyungholee detectingpotentialinsiderthreatanalyzinginsiderssentimentexposedinsocialmedia
_version_ 1725528828357378048