UP - logo
E-resources
Full text
Peer reviewed
  • Textual analysis of traitor...
    Janjua, Faisal; Masood, Asif; Abbas, Haider; Rashid, Imran; Khan, Malik M. Zaki Murtaza

    Future generation computer systems, December 2021, 2021-12-00, Volume: 125
    Journal Article

    Insider threats are one of the most challenging and growing security threats which the government agencies, organizations, and institutions face. In such scenarios, malicious (red) activities are performed by the authorized individuals within the company. Because of which, an insider threat has become a taxing and difficult task to identify among other attacks. Along with other monitoring parameters; email logs play a vital role in many research areas such as stalking Insider Threat involving Collaborating Traitors, Textual Analysis, and Social Media exploration. This paper presents a semi-supervised machine learning framework which embraces the pre-processing and classification techniques together for unlabeled dataset i.e. emails. Enron Corporation dataset has been used for experiments and TWOS for evaluation of the proposed framework. Initially, dataset is transformed into vector form using Term Frequency–Inverse Document Frequency (TF–IDF). Thereafter, K-Means is used to classify emails based on message content. Finally, Machine Learning algorithm Decision Tree (DT) is applied to classify the malicious activities. The proposed framework has also been tested with other algorithms such as Logistic Regression (LR), Naive Bayes (NB), KNN, Support Vector Machine (SVM), Random Forest (RF) and Neural Network (NN). However, Decision Tree (DT) combined with pre-processing steps has given the desired results with 99.96% Accuracy and 0.994 AUC for identification of malicious content. •Insider threat to employers and companies is a complex and growing challenge.•Research devoted to “traitor detection” has remained very restricted as compared to “masquerader detection”.•Insider threat detection performed through Textual analysis, big data and email logs are worthwhile.•In this research Class label identification done through clustering algorithm.•Prediction of malicious emails by using multiple Machine Learning Classifiers.