Compromised user credentials detection in a digital enterprise using behavioral analytics

dc.contributor.authorShah, Saleh
dc.contributor.authorShah, Babar
dc.contributor.authorAmin, Adnan
dc.contributor.authorAl-Obeidat, Feras
dc.contributor.authorChow, Francis
dc.contributor.authorAnwar, Sajid
dc.contributor.authorMoreira, Fernando
dc.date.accessioned2019-05-10T16:17:22Z
dc.date.available2019-05-10T16:17:22Z
dc.date.embargo2020-05-31
dc.date.issued2019-04
dc.description.abstractIn today’s digital age, the digital transformation is necessary for almost every competitive enterprise in terms of having access to the best resources and ensuring customer satisfaction. However, due to such rewards, these enterprises are facing key concerns around the risk of next-generation data security or cybercrime which is continually increasing issue due to the digital transformation four essential pillars—cloud computing, big data analytics, social and mobile computing. Data transformation-driven enterprises should ready to handle this next-generation data security problem, in particular, the compromised user credential (CUC). When an intruder or cybercriminal develops trust relationships as a legitimate account holder and then gain privileged access to the system for misuse. Many state-of-the-art risk mitigation tools are being developed, such as encrypted and secure password policy, authentication, and authorization mechanism. However, the CUC has become more complex and increasingly critical to the digital transformation process of the enterprise’s database by a cybercriminal, we propose a novel technique that effectively detects CUC at the enterprise-level. The proposed technique is learning from the user’s behavior and builds a knowledge base system (KBS) which observe changes in the user’s operational behavior. For that reason, a series of experiments were carried out on the dataset that collected from a sensitive database. All empirical results are validated through well-known evaluation measures, such as (i) accuracy, (ii) sensitivity, (iii) specificity, (iv) prudence accuracy, (v) precision, (vi) f-measure, and (vii) error rate. The experiments show that the proposed approach obtained weighted accuracy up to 99% and overall error of about 1%. The results clearly demonstrate that the proposed model efficiently can detect CUC which may keep an organization safe from major damage in data through cyber-attacks.pt_PT
dc.identifier.citationShah, S., Shah, B., Amin, A., Al-Obeidat, F., Chow, F., Moreira, F., … Anwar, S. (2019). Compromised user credentials detection in a digital enterprise using behavioral analytics. Future Generation Computer Systems, 93, 407-417. doi: 10.1016/j.future.2018.09.064. Disponível no Repositório UPT, http://hdl.handle.net/11328/2682pt_PT
dc.identifier.doihttps://doi.org/10.1016/j.future.2018.09.064pt_PT
dc.identifier.issn0167-739X
dc.identifier.urihttp://hdl.handle.net/11328/2682
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.relation.publisherversionhttps://www.sciencedirect.com/science/article/pii/S0167739X18312524pt_PT
dc.rightsembargoed accesspt_PT
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.subjectCompromised user detectionpt_PT
dc.subjectCompromised activities detectionpt_PT
dc.subjectKnowledge-base systempt_PT
dc.subjectPrudence analysispt_PT
dc.subjectCluster-level patternpt_PT
dc.titleCompromised user credentials detection in a digital enterprise using behavioral analyticspt_PT
dc.typejournal articlept_PT
degois.publication.firstPage407pt_PT
degois.publication.lastPage417pt_PT
degois.publication.titleFuture Generation Computer Systemspt_PT
degois.publication.volume93pt_PT
dspace.entity.typePublicationen
person.affiliation.nameUniversidade Portucalense
person.familyNameMoreira
person.givenNameFernando
person.identifier.ciencia-id7B1C-3A29-9861
person.identifier.orcid0000-0002-0816-1445
person.identifier.ridP-9673-2016
person.identifier.scopus-author-id8649758400
relation.isAuthorOfPublicationbad3408c-ee33-431e-b9a6-cb778048975e
relation.isAuthorOfPublication.latestForDiscoverybad3408c-ee33-431e-b9a6-cb778048975e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
J30.pdf
Size:
1.28 MB
Format:
Adobe Portable Document Format