Skip to main content
2024 International Conference on Circuit, Systems and Communication, ICCSC 202420242024 International Conference on Circuit, Systems and Communication, ICCSC 2024; Fez; Morocco; 28 June 2024 through 29 June 2024; Category numberCFP24VN7-ART; Code 201555

Insider Threat Detection Using Bidirectional Encoder Representations from Transformers and Optimized AdaBoost Classifier(Conference Paper)

  Save all to author list
  • aSingidunum University, Faculty of Informatics and Computing, Belgrade, Serbia
  • bUniversity 'Union Nikola Tesla', Faculty of Information Technology and Engineering, Belgrade, Serbia

Abstract

Cybersecurity plays an increasingly vital role in contemporary times, particularly as large companies face escalating threats and substantial losses, with ransomware attacks standing out as one of the more sophisticated forms of intrusion. In such attacks, hackers infiltrate systems, encrypt crucial company data, and then demand a ransom for data decryption or the restoration of control over the system. The application of natural language processing (NLP) emerges as a promising avenue, offering the potential to analyze attack patterns and recognize malicious intentions before actual attempts occur. Given the inherent specificity of each system, fine-tuning AI algorithms with special settings becomes imperative for optimal efficiency. This research delves into the synergy of NLP and robust classification algorithms to detect cyber attacks through website content analysis. Recognizing that classifier performance hinges on the judicious selection of hyperparameters, we explore a modified version of the recently introduced red fox algorithm (RFO). This adaptation is combined with bidirectional encoder representations from transformers to identify malicious intent in email content. The proposed approach undergoes testing on a real-world dataset, with the best models demonstrating an accuracy of 0.975822 suggesting viability. © 2024 IEEE.

Author keywords

cybersecurityhyperparameter tuningmetaheuristicsnatural language processingred fox algorithm

Indexed keywords

Engineering controlled terms:Ada (programming language)Adaptive boostingClassification (of information)Computer virusesCryptographyCyber attacksDistribution transformersNetwork security
Engineering uncontrolled termsCyber securityHyper-parameterHyperparameter tuningInsider threat detectionsLanguage processingMetaheuristicNatural language processingNatural languagesRed fox algorithmRed foxes
Engineering main heading:Natural language processing systems
  • ISBN: 979-835036530-6
  • Source Type: Conference Proceeding
  • Original language: English
  • DOI: 10.1109/ICCSC62074.2024.10616526
  • Document Type: Conference Paper
  • Volume Editors: El Ghzaoui M.,Aghoutane B.
  • Publisher: Institute of Electrical and Electronics Engineers Inc.

  Kumpf, K.; Singidunum University, Faculty of Informatics and Computing, Belgrade, Serbia
© Copyright 2024 Elsevier B.V., All rights reserved.

Cited by 1 document

Dakic, P. , Zivkovic, M. , Jovanovic, L.
Intrusion detection using metaheuristic optimization within IoT/IIoT systems and software of autonomous vehicles
(2024) Scientific Reports
View details of this citation
{"topic":{"name":"Swarm Intelligence; Genetic Algorithm; Mathematical Optimization","id":42340,"uri":"Topic/42340","prominencePercentile":91.424446,"prominencePercentileString":"91.424","overallScholarlyOutput":0},"dig":"90be018df30376aa9ddab80e620678a148ecd1e31c5ddbe3a977c42f85713ebd"}

SciVal Topic Prominence

Topic:
Prominence percentile: