Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Insider Threat Detection Form Irregular Login Patterns with Metaheuristic Optimized AdaBoost

Version 1 : Received: 18 September 2024 / Approved: 19 September 2024 / Online: 20 September 2024 (10:58:43 CEST)

How to cite: Jovanovic, L.; Spalević, Ž.; Bacanin, N.; Simić, M.; Marković, F. Insider Threat Detection Form Irregular Login Patterns with Metaheuristic Optimized AdaBoost. Preprints 2024, 2024091500. https://doi.org/10.20944/preprints202409.1500.v1 Jovanovic, L.; Spalević, Ž.; Bacanin, N.; Simić, M.; Marković, F. Insider Threat Detection Form Irregular Login Patterns with Metaheuristic Optimized AdaBoost. Preprints 2024, 2024091500. https://doi.org/10.20944/preprints202409.1500.v1

Abstract

This paper addresses a critical concern in intrusion detection within the broader realm of cyber security, particularly focusing on login activity involving the majority of normal users. Utilizing the AdaBoost classifier, the study employs various optimizers to enhance performance by selecting optimal control parameters. A specially tailored version of Crayfish Optimization Algorithm (COA) is introduced to cater to the unique requirements of this investigation. Through a comparative analysis of a simulated publicly available dataset, models optimized by the modified algorithm demonstrate superior outcomes, achieving an accuracy of 94.6128% and displaying an adaptive convergence rate capable of navigating local minima to identify optimal solutions. The best-performing model undergoes SHapley Additive exPlanations (SHAP) analysis to identify key contributing features. Limitations arise from the computational intensity of the optimization process, necessitating consideration of limited populations and smaller numbers of estimators during simulations. Future endeavors will extend the methodology to incorporate additional user actions in classification, with a focus on addressing computational constraints as hardware advancements occur. Proposed, modified algorithm could be applied to deal with various optimization tasks, beyond the scope of this study.

Keywords

AdaBoost; legal frameworks; cyber security; Crayfish optimization algorithm; insider threat; Metaheuristics

Subject

Computer Science and Mathematics, Artificial Intelligence and Machine Learning

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.