Machine learning-based network monitoring for cybersecurity threat detection

Ala’ Abdulmajid Eshmawi, Amal Al-Nowami, Manar Mirza, Nada Abu-Raya, Rawa Al-Thabit, Stavros Shiaeles*, Jin Ghoo Choi, Imran Ashraf*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Cybersecurity has become an important task to safeguard digital assets. Timely detection of cybersecurity threats and effective response are key tasks to deal with ever-complicating cyberattacks. Cyberattacks, particularly insider threats, have become a big threat to networks. Insider threat detection faces additional challenges, such as a lack of insider threat data to analyze properly. In addition, the inability of traditional approaches to distinguish between insider attacks and legitimate activity increases the likelihood that sensitive data and information can be misused by malicious insiders. To mitigate insider threats, this study utilizes multi-class machine learning models, including support vector machines (SVM), random forest (RF), K nearest neighbor (KNN), deep neural network (DNN), and Naive Bayes (NB) to detect user-centered insider threats at various granularity levels. The CERT r5.2 dataset was used in this study to create a user context model for training the models in various experiments. To establish which models are optimal for detecting each insider threat at various granularity levels, the results of several models are compared based on various criteria. Most machine learning models provided satisfactory results, except for NB and KNN, which are primarily affected by unbalanced data. Thereby, oversampling techniques were utilized to optimize the results. The proposed approach produced good results for KNN, RF, DNN, and SVM models with an accuracy of 99.9%, 95.5%, 94%, and 90.5%, respectively.

Original languageEnglish
Article number27
Number of pages43
JournalJournal of Network and Systems Management
Volume34
Issue number1
Early online date14 Nov 2025
DOIs
Publication statusEarly online - 14 Nov 2025

Keywords

  • Cyber-security
  • Deep learning
  • Insider threat detection
  • Machine learning
  • Network anomaly detection
  • Network monitoring

Fingerprint

Dive into the research topics of 'Machine learning-based network monitoring for cybersecurity threat detection'. Together they form a unique fingerprint.

Cite this