{"id":"https://openalex.org/W3208604243","doi":"https://doi.org/10.1109/icccnt51525.2021.9579549","title":"Insider Attack: Internal Cyber Attack Detection Using Machine Learning","display_name":"Insider Attack: Internal Cyber Attack Detection Using Machine Learning","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3208604243","doi":"https://doi.org/10.1109/icccnt51525.2021.9579549","mag":"3208604243"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579549","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103517480","display_name":"P. V. Suresh","orcid":null},"institutions":[{"id":"https://openalex.org/I72769676","display_name":"Gautam Buddha University","ror":"https://ror.org/026cfwd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I72769676"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P. Varsha Suresh","raw_affiliation_strings":["Sree Buddha College of Engineering,Dept. of Computer Science,Kerala,India"],"affiliations":[{"raw_affiliation_string":"Sree Buddha College of Engineering,Dept. of Computer Science,Kerala,India","institution_ids":["https://openalex.org/I72769676"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088032070","display_name":"Minu Lalitha Madhavu","orcid":"https://orcid.org/0000-0002-5551-299X"},"institutions":[{"id":"https://openalex.org/I72769676","display_name":"Gautam Buddha University","ror":"https://ror.org/026cfwd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I72769676"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Minu Lalitha Madhavu","raw_affiliation_strings":["Sree Buddha College of Engineering,Dept. of Computer Science,Kerala,India"],"affiliations":[{"raw_affiliation_string":"Sree Buddha College of Engineering,Dept. of Computer Science,Kerala,India","institution_ids":["https://openalex.org/I72769676"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103517480"],"corresponding_institution_ids":["https://openalex.org/I72769676"],"apc_list":null,"apc_paid":null,"fwci":0.9169,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.76592538,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7835153341293335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.638534426689148},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5018377304077148},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4693392813205719},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46733009815216064},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4669906497001648},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3736075162887573},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36654701828956604}],"concepts":[{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7835153341293335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.638534426689148},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5018377304077148},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4693392813205719},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46733009815216064},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4669906497001648},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3736075162887573},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36654701828956604},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579549","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1859925930","https://openalex.org/W2576753210","https://openalex.org/W2826488848","https://openalex.org/W2884984219","https://openalex.org/W2887799638","https://openalex.org/W2892204215","https://openalex.org/W2906774965","https://openalex.org/W2974856932","https://openalex.org/W3000429356","https://openalex.org/W3002827238","https://openalex.org/W3009500417","https://openalex.org/W6731984093","https://openalex.org/W6773299871"],"related_works":["https://openalex.org/W1472067","https://openalex.org/W7465187","https://openalex.org/W11297145","https://openalex.org/W5005022","https://openalex.org/W13692438","https://openalex.org/W10715555","https://openalex.org/W6479499","https://openalex.org/W13188192","https://openalex.org/W855484","https://openalex.org/W790158"],"abstract_inverted_index":{"A":[0,105],"Cyber":[1,36],"Attack":[2],"is":[3,23,68,119,124,135],"a":[4,155],"sudden":[5],"attempt":[6],"launched":[7],"by":[8,29],"cybercriminals":[9],"against":[10],"multiple":[11],"computers":[12],"or":[13],"networks.":[14],"According":[15],"to":[16,60,146,154,189,204],"evolution":[17],"of":[18,93,102,141],"cyber":[19],"space,":[20],"insider":[21,51,64,81,206],"attack":[22,27,82],"the":[24,34,69,91,97,138,161,169],"most":[25],"serious":[26],"faced":[28],"end":[30],"users,":[31],"all":[32],"over":[33],"world.":[35],"Security":[37],"reports":[38],"shows":[39],"that":[40,72,168],"both":[41],"US":[42],"federal":[43],"Agency":[44],"as":[45,47,109],"well":[46],"different":[48],"organizations":[49],"faces":[50],"threat.":[52],"Machine":[53],"learning":[54],"(ML)":[55],"provide":[56],"an":[57,173],"important":[58],"technology":[59],"secure":[61],"data":[62,86],"from":[63],"threats.":[65],"Random":[66,103,110,142,152,191],"Forest":[67,111,143,192],"best":[70],"algorithm":[71,107,145,158,195],"focus":[73],"on":[74,85],"user's":[75],"action,":[76],"services":[77],"and":[78,100,129,159,178,201,208],"ability":[79],"for":[80,126],"detection":[83],"based":[84],"granularity.":[87],"Substantial":[88],"raise":[89],"in":[90,137,176,185,199],"count":[92],"decision":[94],"tree,":[95],"increases":[96,160],"time":[98,186],"consumption":[99],"complexity":[101,187],"Forest.":[104],"novel":[106],"Known":[108],"With":[112],"Randomized":[113,130],"Weighted":[114,131],"Fuzzy":[115,121],"Feature":[116],"Set":[117],"(RF-RWFF)":[118],"developed.":[120],"Membership":[122],"Function":[123],"used":[125,136,198],"feature":[127],"aggregation":[128],"Majority":[132],"Algorithm":[133],"(RWMA)":[134],"prediction":[139],"part":[140],"(RF)":[144],"perform":[147],"voting.":[148],"RWMA":[149],"transform":[150],"conventional":[151,190],"Forest,":[153],"perceptron":[156],"like":[157],"miliage.":[162],"The":[163],"experimental":[164],"results":[165],"obtained":[166],"illustrate":[167],"proposed":[170],"model":[171],"exhibits":[172],"overall":[174],"improvement":[175],"accuracy":[177],"recall":[179],"rate":[180],"with":[181],"very":[182],"much":[183],"decrease":[184],"compared":[188],"algorithm.":[193],"This":[194],"can":[196],"be":[197],"organization":[200],"government":[202],"sector":[203],"detect":[205],"fastly":[207],"accurately.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2026-02-15T05:58:04.055770","created_date":"2025-10-10T00:00:00"}
