Analyzing individual data for insider threat detection

dc.contributor.advisor Özdemir, Enver
dc.contributor.author Yakar, Burak
dc.contributor.authorID 707211003
dc.contributor.department Cybersecurity Engineering and Cryptography
dc.date.accessioned 2025-05-23T08:06:12Z
dc.date.available 2025-05-23T08:06:12Z
dc.date.issued 2024-07-16
dc.description Thesis (M.Sc.) -- Istanbul Technical University, Graduate School, 2024
dc.description.abstract Insider threats have been recognized as one of the most significant risks in cybersecurity. Research indicates that a majority of security breaches are caused by attacks or vulnerabilities originating from within the organization. Even with the most secure systems, as long as humans are part of the system, absolute security cannot be guaranteed. Technology is everywhere in our lives. People use smartphones, smartwatches, computers, and various other smart devices, all of which collect data to some extent. This data collection occurs not only on a personal level but also across businesses of all sizes. As businesses invest heavily in their operations, they need to secure their assets. To protect these assets, businesses invest in security measures. While some of these investments are physical precautions against physical risks, others are related to cybersecurity to mitigate cyber risks. Even if businesses build the best IDS (Intrusion Detection System) or IPS (Intrusion Protection System), there may still be ways for attackers to infiltrate and sneak in. This is because humans are the weakest component of any ICT (Information and Communications Technology) security system and present the greatest risks and threats to a company, organization, or system. Insider threats are cybersecurity threats that originate from authorized users, such as employees, business partners, contractors, vendors, and former employees. Misusing legitimate user credentials and account hijacking are some methods to carry out these intentions. These actions are not necessarily all intentional; some may be unintentional. However, as a result of these actions, the confidentiality, integrity, and availability of systems and data are compromised. The cost of these actions can cause significant expenses that most SMEs (small to medium-sized businesses) cannot afford. This study focuses on defining insider threats, mitigating security risks leading to insider vulnerabilities, and preventing insider threats by analyzing individual data using the random forest algorithm. The aim of this study is to find a method to detect malicious intentions and prevent potential attacks before they occur.
dc.description.degree M.Sc.
dc.identifier.uri http://hdl.handle.net/11527/27154
dc.language.iso en_US
dc.publisher Graduate School
dc.sdg.type Goal 7: Affordable and Clean Energy
dc.sdg.type Goal 9: Industry, Innovation and Infrastructure
dc.sdg.type Goal 11: Sustainable Cities and Communities
dc.subject Network security
dc.subject Ağ güvenliği
dc.subject Information security
dc.subject Bilgi güvenliği
dc.subject Cyber security
dc.subject Siber güvenlik
dc.subject Data analyzing
dc.subject Veri analizi
dc.title Analyzing individual data for insider threat detection
dc.title.alternative İçeriden tehditlerin tespiti için bireysel verilerin analizi
dc.type Master Thesis
Dosyalar
Orijinal seri
Şimdi gösteriliyor 1 - 1 / 1
thumbnail.default.alt
Ad:
707211003.pdf
Boyut:
2.57 MB
Format:
Adobe Portable Document Format
Açıklama
Lisanslı seri
Şimdi gösteriliyor 1 - 1 / 1
thumbnail.default.placeholder
Ad:
license.txt
Boyut:
1.58 KB
Format:
Item-specific license agreed upon to submission
Açıklama