Hazem M. Kotb
A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats
Kotb, Hazem M.; Gaber, Tarek; AlJanah, Salem; Zawbaa, Hossam M.; Alkhathami, Mohammed
Authors
Tarek Gaber
Salem AlJanah
Hossam M. Zawbaa
Mohammed Alkhathami
Abstract
Insider threats pose a significant challenge to IT security, particularly with the rise of generative AI technologies, which can create convincing fake user profiles and mimic legitimate behaviors. Traditional intrusion detection systems struggle to differentiate between real and AI-generated activities, creating vulnerabilities in detecting malicious insiders. To address this challenge, this paper introduces a novel Deep Synthesis Insider Intrusion Detection (DS-IID) model. The model employs deep feature synthesis to automatically generate detailed user profiles from event data and utilizes binary deep learning for accurate threat identification. The DS-IID model addresses three key issues: it (i) detects malicious insiders using supervised learning, (ii) evaluates the effectiveness of generative algorithms in replicating real user profiles, and (iii) distinguishes between real and synthetic abnormal user profiles. To handle imbalanced data, the model uses on-the-fly weighted random sampling. Tested on the CERT insider threat dataset, the DS-IID achieved 97% accuracy and an AUC of 0.99. Moreover, the model demonstrates strong performance in differentiating real from AI-generated (synthetic) threats, achieving over 99% accuracy on optimally generated data. While primarily evaluated on synthetic datasets, the high accuracy of the DS-IID model suggests its potential as a valuable tool for real-world cybersecurity applications.
Citation
Kotb, H. M., Gaber, T., AlJanah, S., Zawbaa, H. M., & Alkhathami, M. (2025). A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats. Scientific Reports, 15, Article 207. https://doi.org/10.1038/s41598-024-84673-w
Journal Article Type | Article |
---|---|
Acceptance Date | Dec 25, 2024 |
Online Publication Date | Jan 2, 2025 |
Publication Date | Jan 2, 2025 |
Deposit Date | Jan 10, 2025 |
Publicly Available Date | Jan 10, 2025 |
Journal | Scientific Reports |
Publisher | Nature Publishing Group |
Peer Reviewed | Peer Reviewed |
Volume | 15 |
Article Number | 207 |
DOI | https://doi.org/10.1038/s41598-024-84673-w |
Files
Published Version
(1.8 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Deep churn prediction method for telecommunication industry
(2023)
Journal Article
Optimized and efficient image-based IoT malware detection method
(2023)
Journal Article
Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey
(2022)
Journal Article
A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms
(2022)
Journal Article