Skip to main content

A Framework for Improving the Accuracy with Different Sampling Techniques for Detection of Malicious Insider Threat in Cloud

  • Conference paper
  • First Online:
Proceedings of International Joint Conference on Advances in Computational Intelligence

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Cloud computing provides more beneficial services to its users with limited cost. Cloud is prone to many threats, and one of the major threats is the malicious insider threat. Detection of malicious insider threats is more challenging, and many cloud datasets are available to detect a malicious insider. In real-time data collection, the data set is prone to a class imbalance problem. Minority class related to insider threat events has a smaller number of instances, whereas majority class related to non-insider threats has a minimum number of instances. Supervised classification techniques provide a better result for the classification of the majority class and a less accurate result for the minority class. Classification without treating the imbalanced class data results in adverse effects in prediction. In this paper, different sampling techniques are implemented to accurately handle the imbalanced class data to detect malicious insider threats in cloud computing. The performance of different sampling techniques is compared by implementing Support Vector Machine (SVM) algorithm using the performance metrics such as accuracy, f-score, precision and recall.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Le D, Heywood Z (2020) Exploring anomalous behaviour detection and classification for insider threat identification. Int J Netw Manage 31(4):e2109

    Google Scholar 

  2. Devi D, Biswas SK, Purkayastha B (2020) A review on solution to class imbalance problem: undersampling approaches. In: 2020 international conference on computational performance evaluation (ComPE), pp 626–631

    Google Scholar 

  3. Gosain A, Sardana S (2017) Handling class imbalance problem using oversampling techniques: a review. In: 2017 international conference on advances in computing, communications and informatics (ICACCI), pp 79–85

    Google Scholar 

  4. Dittman DJ, Khoshgoftaar TM, Wald R, Napolitano A (2014) Comparison of data sampling approaches for imbalanced bioinformatics data. In: The twenty-seventh international FLAIRS conference, pp 268–271

    Google Scholar 

  5. Junsomboon N, Phienthrakul T (2017) Combining over-sampling and under-sampling techniques for imbalance dataset. In: Proceedings of the 9th international conference on machine learning and computing, pp 243–247

    Google Scholar 

  6. Hasanin T, Khoshgoftaar T (2018) The effects of random undersampling with simulated class imbalance for big data. In: 2018 IEEE international conference on information reuse and integration (IRI), pp 70–79

    Google Scholar 

  7. He H, Bai Y, Garcia EA, Li S (2008) ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence), pp 1322–1328

    Google Scholar 

  8. Yap BW, Abd Rani K, Abd Rahman HA, Fong S, Khairudin Z, Abdullah NN (2014) An application of oversampling, undersampling, bagging and boosting in handling imbalanced datasets. In: Proceedings of the first international conference on advanced data and information engineering (DaEng-2013). Springer, Singapore, pp 13–22

    Google Scholar 

  9. Fujiwara K et al (2020) Over- and under-sampling approach for extremely imbalanced and small minority data problem in health record analysis. Front Public Health 8:178. https://doi.org/10.3389/fpubh.2020.00178

    Article  Google Scholar 

  10. Bunkhumpornpat C, Subpaiboonkit S (2013) Safe level graph for synthetic minority over-sampling techniques. In: 2013 13th international symposium on communications and information technologies (ISCIT). IEEE, pp 570–575

    Google Scholar 

  11. Abdi L, Hashemi S (2015) To combat multi-class imbalanced problems by means of over-sampling techniques. IEEE Trans Knowl Data Eng 28(1):238–251

    Article  Google Scholar 

  12. Elhassan T, Aljurf M (2016) Classification of imbalance data using Tomek link (T-link) combined with random under-sampling (RUS) as a data reduction method. Global J Technol Optim S1:11

    Google Scholar 

  13. Glasser J, Lindauer B (2013) Bridging the gap: a pragmatic approach to generating insider threat data. In: 2013 IEEE security and privacy workshops, pp 98–104

    Google Scholar 

  14. Meng F, Lou F, Fu Y, Tian Z (2018) Deep learning based attribute classification insider threat detection for data security. In: 2018 IEEE third international conference on data science in cyberspace (DSC), pp 576–581

    Google Scholar 

  15. Pengfei J, Chunkai Z, Zhenyu H (2014) A new sampling approach for classification of imbalanced data sets with high density. In: 2014 international conference on big data and smart computing (BIGCOMP), pp 217–222

    Google Scholar 

  16. Guo H, Li Y, Shang J, Mingyun G, Yuanyue H, Bing G (2017) Learning from class-imbalanced data: review of methods and applications. Expert Syst Appl 73:220–239

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by Centre for Cyber Intelligence (CCI), DST-CURIE-AI-Phase II Project, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, Tamilnadu, India - 641027.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Asha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Padmavathi, G., Shanmugapriya, D., Asha, S. (2022). A Framework for Improving the Accuracy with Different Sampling Techniques for Detection of Malicious Insider Threat in Cloud. In: Uddin, M.S., Jamwal, P.K., Bansal, J.C. (eds) Proceedings of International Joint Conference on Advances in Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-0332-8_36

Download citation

Publish with us

Policies and ethics