Analyzing individual data for insider threat detection
Analyzing individual data for insider threat detection
dc.contributor.advisor | Özdemir, Enver | |
dc.contributor.author | Yakar, Burak | |
dc.contributor.authorID | 707211003 | |
dc.contributor.department | Cybersecurity Engineering and Cryptography | |
dc.date.accessioned | 2025-05-23T08:06:12Z | |
dc.date.available | 2025-05-23T08:06:12Z | |
dc.date.issued | 2024-07-16 | |
dc.description | Thesis (M.Sc.) -- Istanbul Technical University, Graduate School, 2024 | |
dc.description.abstract | Insider threats have been recognized as one of the most significant risks in cybersecurity. Research indicates that a majority of security breaches are caused by attacks or vulnerabilities originating from within the organization. Even with the most secure systems, as long as humans are part of the system, absolute security cannot be guaranteed. Technology is everywhere in our lives. People use smartphones, smartwatches, computers, and various other smart devices, all of which collect data to some extent. This data collection occurs not only on a personal level but also across businesses of all sizes. As businesses invest heavily in their operations, they need to secure their assets. To protect these assets, businesses invest in security measures. While some of these investments are physical precautions against physical risks, others are related to cybersecurity to mitigate cyber risks. Even if businesses build the best IDS (Intrusion Detection System) or IPS (Intrusion Protection System), there may still be ways for attackers to infiltrate and sneak in. This is because humans are the weakest component of any ICT (Information and Communications Technology) security system and present the greatest risks and threats to a company, organization, or system. Insider threats are cybersecurity threats that originate from authorized users, such as employees, business partners, contractors, vendors, and former employees. Misusing legitimate user credentials and account hijacking are some methods to carry out these intentions. These actions are not necessarily all intentional; some may be unintentional. However, as a result of these actions, the confidentiality, integrity, and availability of systems and data are compromised. The cost of these actions can cause significant expenses that most SMEs (small to medium-sized businesses) cannot afford. This study focuses on defining insider threats, mitigating security risks leading to insider vulnerabilities, and preventing insider threats by analyzing individual data using the random forest algorithm. The aim of this study is to find a method to detect malicious intentions and prevent potential attacks before they occur. | |
dc.description.degree | M.Sc. | |
dc.identifier.uri | http://hdl.handle.net/11527/27154 | |
dc.language.iso | en_US | |
dc.publisher | Graduate School | |
dc.sdg.type | Goal 7: Affordable and Clean Energy | |
dc.sdg.type | Goal 9: Industry, Innovation and Infrastructure | |
dc.sdg.type | Goal 11: Sustainable Cities and Communities | |
dc.subject | Network security | |
dc.subject | Ağ güvenliği | |
dc.subject | Information security | |
dc.subject | Bilgi güvenliği | |
dc.subject | Cyber security | |
dc.subject | Siber güvenlik | |
dc.subject | Data analyzing | |
dc.subject | Veri analizi | |
dc.title | Analyzing individual data for insider threat detection | |
dc.title.alternative | İçeriden tehditlerin tespiti için bireysel verilerin analizi | |
dc.type | Master Thesis |