Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Won-
dc.contributor.authorYou, Youngin-
dc.contributor.authorLee, Kyungho-
dc.date.accessioned2021-12-19T03:40:41Z-
dc.date.available2021-12-19T03:40:41Z-
dc.date.created2021-08-30-
dc.date.issued2018-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/132127-
dc.description.abstractIn the era of Internet of Things (IoT), impact of social media is increasing gradually. With the huge progress in the IoT device, insider threat is becoming much more dangerous. Trying to find what kind of people are in high risk for the organization, about one million of tweets were analyzed by sentiment analysis methodology. Dataset made by the web service "Sentiment140" was used to find possible malicious insider. Based on the analysis of the sentiment level, users with negative sentiments were classified by the criteria and then selected as possible malicious insiders according to the threat level. Machine learning algorithms in the open-sourced machine learning software "Weka (Waikato Environment for Knowledge Analysis)" were used to find the possible malicious insider. Decision Tree had the highest accuracy among supervised learning algorithms and K-Means had the highest accuracy among unsupervised learning. In addition, we extract the frequently used words from the topic modeling technique and then verified the analysis results by matching them to the information security compliance elements. These findings can contribute to achieve higher detection accuracy by combining individual's characteristics to the previous studies such as analyzing system behavior.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.titleDetecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kyungho-
dc.identifier.doi10.1155/2018/7243296-
dc.identifier.scopusid2-s2.0-85051007496-
dc.identifier.wosid000440438600001-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Kyung Ho photo

Lee, Kyung Ho
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE