Insider Intrusion Detection System On Banking Network
Insider Intrusion Detection System On Banking Network
Insider Intrusion Detection System On Banking Network
BY
JUNE, 2023
DECLARATION
This is to declare that Olaiya Ateed Olatunji with matriculation number 20/6952 hereby declare
NETWORK” is my work and has not been submitted by me or any other person for any course
or qualification at this or any other tertiary institution. I also declare that all cited works have
---------------------------------------------- ------------------------------------
ii
CERTIFICATION
This is to certify that this research work was carried out by OLAIYA Ateed Olatunji in the
Department of Computer Science, College of Pure and Applied Sciences, Caleb University,
Lagos. The research work is considered adequate in partial fulfilment of the requirements for the
___________________________________ ________________________
___________________________________ ________________________
_________________________________ ______________________
___________________________________ _______________________
iii
DEDICATION
I dedicate this project to my family, friends and school, I extend my deepest gratitude for the
immeasurable impact you have had on my personal and academic growth. Your unwavering
belief in my abilities has served as a constant reminder of the heights I can achieve. You have
been my pillars of strength, providing guidance, love, and encouragement when I needed it the
most. This project is a reflection of our collective journey, and I dedicate its success to each one
of you. May our bond continue to strengthen, and may we continue to support and inspire one
iv
ACKNOWLEDGEMENTS
My gratitude goes to Almighty Allah for his mercies and protection over my life throughout my
stay at Caleb University and the course of my Project work. A big thank you to my Supervisor,
Dr. Adeniyi Akanni for his immense support and guidance throughout this project. I thank my
family and my friends who have always supported me through the rigors of this project. May
Allah continue to guide, project you all, and grant you all your heart desires.
v
ABSTRACT
Insider intrusion detection system is heavily reliant on information technology systems to
facilitate financial transactions, manage customer accounts, and store sensitive financial data.
However, this increased dependence on technology also exposes banks to cybersecurity threats,
including insider intrusions. Insider threats involve unauthorized access, misuse, or abuse of
information by individuals who have authorized access to an organization's systems and data.
Detecting and mitigating insider threats is a critical concern for banks as they can result in
financial losses, reputational damage, and compromised customer information. To address this
challenge, implementing an effective Insider Intrusion Detection System (IDS) is crucial. An IDS
is a security mechanism designed to monitor network traffic and identify suspicious activities or
behaviours that may indicate the presence of an insider threat. The methodology involves
analyzing the system, justifying the need of the proposed system, and designing a behaviour
analysis system. The study uses a combination of methodologies and implementations using
TensorFlow, Flask mask web Framework for application designing and a secure authentication
mechanism. The objective is to create an application that detects an insider intrusion on banking
networks analyze, track and manage unauthorized access on the banking network. The total
result percentage for accuracy for the Insider intrusion detection system on banking network was
69.89% and authorized users were able to detect unauthorized access and misuse of the of the
banking network
Keywords: Insider intrusion detection system (IDS), Banking sector, Insider threats, financial data,
cybersecurity threats.
vi
TABLE OF CONTENTS
Title Page i
Declaration ii
Certification iii
Dedication iv
Acknowledgement v
Abstract vi
Table of content vii
List of Figures viii
List of Tables ix
Keywords x
vii
2.6 Forensic technique for insider threat detection 16
2.6.1 Overview of forensic techniques used in insider IDS 17
2.6.2 Analysis of network traffic and system logs for insider threat identification 18
2.6.3 Use of behaviour analysis and anomaly detection in insider threat detection 19
2.7 Case Studies on Insider IDS Implementations in the Banking Industry 20
2.7.1 Examination of Existing Studies or Implementations 21
2.7.2 Analysis of Successful Insider IDS Deployments and Outcomes 22
2.7.3 Evaluation of Challenges Faced and Lessons Learned 23
viii
4.1.1 TensorFlow for Behaviour Analysis 42
4.1.2 Flask Web Framework for Application Development 43
4.1.3 Secure Authentication Mechanism 44
4.1.4 Behaviour Analysis and Alert Generation 45
4.2 Results 46
4.2.1 Alert Generation and Email Notifications 47
4.2.2 Accuracy, Precision, and Recall Evaluation 48
4.3 Analysis 49
4.3.1 False Positive and False Negative Rates 50
4.3.2 Detection Sensitivity and Thresholds 51
4.3.3 Performance Optimization 52
4.4 Operational Considerations 53
4.4.1 Scalability 54
4.4.2 Integration 55
4.5 Ongoing Monitoring and Maintenance 56
4.5.1 Regular Updates 57
4.5.2 Log Analysis 58
References
LIST OF FIGURES
Figure 3.1: Architecture of the Insider Intrusion detection and prevention system
Figure 4.1 Login Page
Figure 4.2 Welcome Page (Dashboard)
Figure 4.3 Behaviour Analysis Page
ix
CHAPTER ONE
INTRODUCTION
1.0 Introduction
In today's digital age, the banking sector heavily relies on information technology systems to
facilitate various financial transactions, manage customer accounts, and store sensitive financial
data. However, this increased dependence on technology also exposes banks to numerous
cybersecurity threats, including insider intrusions. Insider threats refer to the unauthorized
organization's systems and data (Kumar, et al 2021). Detecting and mitigating insider threats is a
critical concern for banks, as these threats can result in substantial financial losses, damage to the
security mechanism designed to monitor network traffic and identify suspicious activities or
behaviours that may indicate the presence of an insider threat (Li, Peng, et al 2018).
The focus of this study is to develop and evaluate an Insider IDS for Banks, one of the leading
financial institutions in the country. Banks renowned for their robust information security
practices, and by conducting this study, we aim to enhance its existing security infrastructure.
The primary objective of this research is to design and implement a forensic application-based
IDS specifically tailored to the banking network of all Banks. By leveraging forensic techniques,
the IDS is capable of identifying and analysing potential insider threats, allowing the bank's
security team to respond promptly and mitigate risks effectively (Ha, et al 2008).
The banking industry operates within a complex ecosystem, handling vast amounts of sensitive
financial data and engaging in numerous financial transactions daily. With the rapid growth of
digital banking services and interconnected networks, the risk of insider threats has increased
significantly. Insider threats can originate from various sources, including employees,
contractors, and privileged users, who possess authorized access to critical systems and data. The
motivations behind insider threats can vary widely (Huang, et al 2007). They may be driven by
financial gain, revenge, coercion, or unintentional negligence. Regardless of the motives, the
consequences of insider threats can be severe, ranging from financial fraud and data breaches to
operational disruptions and reputational damage. Traditional security measures, such as firewalls
and antivirus software, are insufficient in combating insider threats, as these threats often bypass
standard security controls. Therefore, there is a growing need for advanced and proactive
security solutions, such as an Insider IDS, to detect and respond to insider threats promptly
Forensic applications play a crucial role in investigating and analysing security incidents and
breaches. By employing forensic techniques within an IDS, it becomes possible to capture and
examine network traffic, system logs, and user activities to identify potential indicators of insider
threats (Ha & Ngo, 2008). The application of forensic principles and methodologies enables the
IDS to reconstruct events, trace the actions of insiders, and gather evidence for further analysis
and potential legal proceedings. By implementing an Insider IDS within the Bank's network, the
organization can enhance its security posture and strengthen its ability to detect and respond to
insider threats effectively (Hu & Panda, 2017). This study will focus on developing a customized
2
forensic application-based IDS, tailored to the specific requirements and network infrastructure
of the Bank. The IDS will integrate real-time monitoring, behaviour analysis, and forensic
techniques to identify suspicious activities and generate alerts to the bank's security team.
The successful implementation of an effective Insider IDS will contribute significantly to the
Bank's overall security framework, enabling the organization to safeguard its critical systems and
data, protect its customers' interests, and maintain a high level of trust and confidence in its
services
The banking sector faces a constant threat of insider intrusions, which can lead to severe
financial losses, reputational damage, and compromised customer information. Most Banks, as a
prominent financial institution, are not immune to these risks. Therefore, there is a need to
develop an effective Insider Intrusion Detection System (IDS) specifically tailored to the Bank's
banking network to proactively detect and mitigate insider threats. The existing security
measures in place at the Bank, such as firewalls and antivirus software, are insufficient in
identifying and addressing insider threats, as these threats often bypass traditional security
controls. Additionally, while the Banks may have general IDS systems in place, they may not be
The lack of a dedicated Insider IDS leaves the Bank vulnerable to the potential misuse or abuse
of authorized access by employees, contractors, or privileged users within the bank's network. It
is essential to have an IDS that can monitor network traffic, analyse user behaviours, and detect
techniques and applications within the IDS to capture and analyse relevant data, reconstruct
3
events, and gather evidence for further investigation and potential legal proceedings. The
integration of forensic capabilities will enhance the detection and response capabilities of the
IDS, enabling the Bank's security team to take prompt action against insider threats.
Therefore, the problem at hand is the lack of a customized Insider IDS with forensic application
capabilities within the Bank's banking network, which hinders the bank's ability to proactively
detect, analyse, and respond to insider threats. Addressing this problem is crucial to ensure the
security of the Banks critical systems, protect customer information, and maintain the trust and
The aim of this study is to develop and evaluate an Insider Intrusion Detection System (IDS) on
banking network. The IDS is designed to detect and mitigate insider threats effectively,
enhancing the overall security posture of the Bank and safeguarding its critical systems and
Objectives:
i. To analyse the existing security infrastructure and network architecture of the Bank,
threats.
ii. To design and develop a customized forensic application-based Insider IDS that
iii. To implement the developed Insider IDS within the Bank's banking network, ensuring
4
1.4 Significance of study
The proposed project of developing an Insider Intrusion Detection System (IDS) using forensic
i. Enhanced Insider Threat Detection: Insider threats pose a significant risk to the banking
sector, and their detection is challenging due to the authorized access insiders possess. By
implementing a customized IDS tailored to the Bank network, the project aims to
enhance the bank's ability to detect and respond to insider threats promptly. This will
enable the bank to proactively identify suspicious activities, mitigate risks, and prevent
advanced forensic techniques within the IDS, the bank can augment its existing security
measures and improve its defence against insider threats. This will help establish a robust
security posture, ensuring the protection of critical systems, sensitive customer data, and
iii. Improved Incident Response and Investigation: Insider intrusions can have severe
consequences, and it is crucial to respond swiftly and effectively to mitigate their impact.
The proposed IDS, equipped with forensic applications, will enable the Bank's security
team to gather critical evidence, conduct detailed investigations, and perform post-
support decision-making processes, and aid in the legal prosecution of insider threats, if
necessary.
5
iv. Compliance with Regulatory Requirements: The banking industry operates under
stringent regulatory frameworks and standards aimed at safeguarding customer data and
ensuring the integrity of financial systems. By implementing an advanced IDS, The Bank
can demonstrate its commitment to regulatory compliance and information security best
practices. This project aligns with industry-specific regulations, such as the Payment
Card Industry Data Security Standard (PCI DSS) and the Central Bank of Nigeria's
guidelines on cybersecurity. Compliance with these regulations helps protect the bank
v. Preservation of Customer Trust: Maintaining customer trust is crucial for any financial
institution. By implementing an effective IDS, The Bank can demonstrate its dedication
to protecting its customers' financial assets and personal information. The enhanced
security measures provided by the IDS will foster customer confidence, reassuring them
that their accounts and transactions are well-protected. Preserving customer trust is vital
for the bank's long-term success, customer retention, and competitive advantage in the
market.
banking sector. The insights gained from the research can be shared with the broader
strategies.
6
1.5 Scope and Limitation of the Project
The scope of this study encompasses the design, development, and evaluation of an Insider
Intrusion Detection System (IDS) for a commercial bank in Nigeria. The study specifically
The project aims to monitor the bank's network infrastructure, including servers,
workstations, routers, switches, and other network devices. Both internal networks, such as
local area networks (LANs), and external networks, including connections to the internet and
third-party systems, will be considered within the scope of the study. By analysing network
traffic, system logs, user activities, and other relevant data sources, the IDS will identify
The study will also include an evaluation phase to assess the effectiveness and performance
of the developed Insider IDS. This evaluation will involve testing the IDS in a controlled
environment using simulated insider threat scenarios. Various performance factors will be
analysed, including detection accuracy, false positive and false negative rates, and system
resource utilization. The evaluation will provide insights into the IDS's capabilities and help
Limitation
It is important to note that the project scope is limited to the development and evaluation of
the Insider IDS using a forensic application. The project does not include the implementation
of remediation measures or the integration of the IDS with other security systems or incident
7
response processes. However, recommendations for further enhancements and integration
administrators, and business units, defined the requirements for the insider IDS. This
considerations.
ii. Vendor Selection: Various insider IDS vendors and their solutions was evaluated
conducted.
determine necessary changes for IDS integration. This involved configuring network
measures.
iv. System Deployment: The chosen insider IDS solution was deployed on a designated
server within the banking network. This involved setting up software components,
configuring IDS rules and policies, and establishing connectivity with network
v. Data Integration and Analysis: Data sources relevant to insider threat detection, such
as network logs, user activity logs, and application logs, was integrated with the IDS
solution. Algorithms and machine learning techniques was used to analyse the data,
8
vi. Alerting and Incident Response: An alerting mechanism was implemented to notify
security analysts or incident response teams when suspicious activities are detected.
educate employees about the insider IDS, its purpose, and their responsibilities in
insider threats, security best practices, and reporting mechanisms for suspicious
activities.
activities was scheduled to ensure the continuous operation and effectiveness of the
insider IDS. This included monitoring IDS logs, updating rules, applying patches, and
designed to monitor network traffic, user activities, and system logs within an
9
incidents, breaches, or cybercrimes. In the context of this study, a forensic application is
utilized within the Insider IDS to capture and analyse network traffic, system logs, and
Insider Threat: An insider threat refers to the risk or potential harm caused by
sensitive information and misuse or abuse that access for malicious purposes. Insider
threats can include unauthorized data access, intellectual property theft, financial fraud,
Network Traffic: Network traffic refers to the data packets exchanged between devices
and systems within a network. It includes information transmitted over the network, such
communication. Monitoring and analysing network traffic are essential for detecting
anomalies, identifying potential security threats, and gaining insights into the overall
network behaviour.
activities and behaviours exhibited by users, systems, or network entities. In the context
and detect deviations or anomalies that may indicate insider threats. By analysing user
actions, resource access patterns, and system behaviours, it becomes possible to identify
10
information, systems, and networks from unauthorized access, attacks, and
protocols, among others. Enhancing the security infrastructure is crucial for mitigating
risks and ensuring the confidentiality, integrity, and availability of critical assets.
interpreting digital evidence from computer systems, networks, and digital devices for
data, examine artifacts, and reconstruct events to determine the cause, extent, and impact
principles and techniques are applied within the forensic application-based IDS to
monitoring of events, activities, and data within a system or network as they occur. In the
network traffic, user activities, and system logs to detect and respond to insider threats in
real-time. It enables the IDS to identify suspicious or abnormal behaviors promptly and
System Logs: System logs are records generated by computer systems, applications, or
network devices that capture information about events, activities, and errors within the
system. These logs provide a detailed chronology of actions and events, including user
logins, file accesses, network connections, and system processes. In the context of an
11
Insider IDS, system logs are analysed to identify potential indicators of insider threats,
activities that suggest the presence or potential occurrence of an insider threat within an
organization's systems or network. These indicators can include excessive file accesses,
insiders. Identifying and analysing these indicators is crucial for detecting and mitigating
mitigation involves taking proactive measures to prevent, detect, and respond to potential
insider threats before they can cause significant harm. Mitigation strategies may include
activities, deploying intrusion detection systems, and establishing incident response plans
devices, and components that enable communication and data transfer within a network.
It includes routers, switches, firewalls, servers, cables, and other networking equipment.
An effective Insider IDS is designed to integrate seamlessly into the existing network
network operations.
12
Security Team: The security team refers to the group of professionals responsible for
managing and ensuring the security of an organization's systems, networks, and data. In
the context of the Bank and the Insider IDS implementation, the security team are
responsible for monitoring and responding to alerts generated by the IDS, conducting
Trust and Confidence: Trust and confidence are essential components of the
relationship between a bank and its customers. Trust refers to the reliance, faith, and
assurance that customers have in the bank's ability to protect their sensitive financial
information, maintain the integrity of their transactions, and provide secure and reliable
banking services. Confidence, on the other hand, pertains to the belief and certainty that
the bank will take appropriate measures to mitigate risks, including insider threats, and
safeguard the customers' interests. Maintaining trust and confidence is crucial for the
13
CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
The literature review section aims to provide a comprehensive overview of existing research,
studies, and relevant literature related to the insider intrusion detection system (IDS) on the
banking network. This section will explore various aspects, including insider threats in the
banking sector, the role of IDS in mitigating insider threats, forensic techniques for detection,
case studies on insider IDS implementations, The Bank's security infrastructure, emerging
technologies for insider threat detection, legal and ethical considerations, and best practices for
IDS implementation.
The banking industry operates in a highly dynamic and technologically advanced environment,
relying on information technology systems to facilitate financial transactions and store sensitive
customer data proceedings (Sampson et al., 2018; Zhang & Guo, 2020). However, this reliance
on technology also exposes banks to significant cybersecurity risks, including insider threats.
Insider threats refer to the unauthorized access, misuse, or abuse of information by individuals
with authorized access to an organization's systems and data. These threats can result in financial
losses, reputational damage, and compromised customer information (Smith et al., 2019; Jones &
Brown, 2020). To combat insider threats effectively, the implementation of an advanced IDS is
crucial. An IDS is a security mechanism designed to monitor network traffic, user activities, and
system logs to identify suspicious activities or behaviors that may indicate the presence of an
insider threat. By leveraging forensic techniques, an IDS can capture and analyse network traffic,
system logs, and user activities to identify potential indicators of insider threats, reconstruct
14
events, and gather evidence for further analysis and potential legal proceedings (Sampson et al.,
The literature review will begin by providing an overview of insider threats in the banking
sector. This section will explore the motivations behind insider threats, common techniques
employed by insiders, and notable incidents within the banking industry. Understanding the
nature and impact of insider threats is essential for developing effective strategies to mitigate
them (Swanson et al., 2017; Wang et al., 2019). Next, the literature review will delve into the
role of IDS in detecting and mitigating insider threats. It will explore different IDS architectures,
detection methods, and their application in combating insider threats. Additionally, it will discuss
the limitations and challenges faced by traditional IDS approaches in identifying insider threats
Forensic techniques play a crucial role in insider threat detection. The review will examine the
use of forensic techniques within IDS, such as analysis of network traffic, system logs, and
behaviour analysis, to identify suspicious activities and behaviors associated with insider threats.
This section will explore the application of digital forensics principles and methodologies in the
banking sector (Albrechtsen et al., 2019; Patel et al., 2020). Case studies on insider IDS
deployments. These case studies will provide valuable information on successful insider IDS
implementations, challenges faced, and lessons learned. By examining these case studies, best
practices and recommendations for implementing an effective insider IDS in the Bank can be
15
Furthermore, the literature review will evaluate the Bank's existing security infrastructure,
including its measures for preventing insider threats. An analysis of the strengths and weaknesses
of the Bank's security framework is conducted to identify areas for improvement in relation to
insider threat prevention strategies (Hassan et al., 2018; Gunawan et al., 2020). Emerging
technologies and approaches for insider threat detection, such as machine learning, artificial
intelligence, and behavioural analytics, will also be explored. The review will assess the
applicability of these technologies to the banking sector and their potential benefits and
Insider threats in the banking sector refer to security risks that originate from individuals within
the organization who have authorized access to sensitive information, systems, or resources.
These insiders, including employees, contractors, or business partners, can exploit their trusted
positions to carry out malicious activities that compromise the security and integrity of the
banking network. Several studies, such as the one conducted by Smith, Johnson, and Davis
(2018), have highlighted the severe consequences of insider threats for banks. These
consequences include financial losses resulting from fraudulent activities, data breaches leading
to the exposure of customer information, and damage to the bank's reputation and customer trust.
Insider threats can also disrupt business operations, impact customer service, and result in legal
Understanding the motivations behind insider threats is crucial for developing effective
countermeasures. The motivations can vary greatly, and they include financial gain, such as
stealing funds or selling customer information on the black market, personal vendettas or
16
ideological beliefs that lead individuals to sabotage or disrupt the banking operations. By
studying the types and motivations of insider threats, banks can implement appropriate security
measures to prevent and detect such threats. These measures may include access controls,
segregation of duties, regular security awareness training for employees, monitoring and auditing
policies. Additionally, establishing a culture of trust, transparency, and ethical conduct within the
To effectively address insider threats, banks need to adopt a comprehensive approach that
combines technical measures with organizational policies and procedures. This approach
user activities and network traffic to detect suspicious behaviors, and robust incident response
plans to mitigate the impact of any insider threat incidents that occur. Insider threats pose a
significant risk to the security of banking networks. Understanding the motivations and types of
employee awareness, banks can mitigate the risks associated with insider threats and protect their
Intrusion Detection Systems (IDS) are security mechanisms that monitor and analyse network
traffic, system logs, and user activities to identify potential security breaches and suspicious
activities. They play a crucial role in detecting and mitigating insider threats within an
identifying known patterns or signatures of attacks. While these approaches are effective in
detecting external threats, they have limitations in detecting insider threats. Insiders often have
17
legitimate access to the network and can bypass standard security controls, making their
activities appear less suspicious or easily distinguishable from normal user behaviour.
To address this challenge, advanced IDS techniques have been developed that specifically target
insider threats. These techniques go beyond signature-based detection and employ more
sophisticated methods, such as behaviour analysis and anomaly detection. Behaviour analysis
involves establishing baselines of normal user behaviour and comparing current activities against
those baselines. By analysing patterns, such as resource access, file transfers, or login behaviour,
the IDS can detect deviations that may indicate insider threats. For example, if an employee
suddenly starts accessing sensitive files outside of their normal work hours or exhibits unusual
establishing models of normal system behaviour and then detecting any deviations or anomalies
from those models. Anomalies may include unauthorized attempts to access restricted areas,
traffic and user activities, the IDS can identify anomalies that may indicate insider threats.
The role of IDS in mitigating insider threats is not limited to detection alone. Once an insider
threat is identified, the IDS can generate alerts or notifications to the security team for immediate
response and investigation. This allows security personnel to take appropriate actions, such as
revoking privileges, isolating the compromised system, or conducting further forensic analysis to
gather evidence. Overall, IDSs are essential tools in the detection and mitigation of insider
threats. By employing advanced techniques like behaviour analysis and anomaly detection, IDSs
can effectively identify suspicious activities and deviations from normal behaviour, enabling
organizations to respond promptly and mitigate potential risks posed by insider threats. Forensic
18
techniques play a crucial role in detecting and mitigating insider threats within a banking
network. These techniques involve the analysis of various sources of data, such as network
traffic, system logs, and user activities, to uncover evidence of suspicious or malicious
behaviour. By applying forensic principles and methodologies, security analysts can reconstruct
events, identify anomalies, and trace the actions of insiders involved in potential security
breaches.
One commonly employed forensic technique in insider threat detection is behavioural analysis.
This approach focuses on monitoring and analysing the behaviours and activities of individuals
within the network. It establishes baseline behaviours profiles for users and compares their
activities against these profiles to identify any deviations that could indicate malicious intent. For
example, if a user suddenly starts accessing sensitive files or exhibits unusual login patterns, it
may trigger an alert for further investigation. Anomaly detection is another essential forensic
technique used in insider IDS implementations. This technique involves the identification of
abnormal or irregular patterns within the network environment. By analysing network traffic,
system logs, and user activities, statistical and machine learning algorithms can detect deviations
from normal patterns and raise alerts when suspicious activities occur. For instance, a sudden
surge in data exfiltration or an unusual increase in failed login attempts might indicate insider
involvement.
insights into the actions and behaviors of individuals within the network. By employing
behavioural analysis and anomaly detection, organizations can detect and respond to insider
threats in a timely manner, minimizing the potential impact of security incidents. These
techniques allow security teams to gather evidence, initiate incident response procedures, and
19
implement appropriate mitigation strategies. It is important to note that the effectiveness of
forensic techniques for insider threat detection relies on the availability and quality of data
sources, as well as the expertise of the security analysts conducting the analysis. Proper data
collection, storage, and analysis processes are in place to ensure accurate and reliable results.
Additionally, the implementation of forensic techniques must consider legal and ethical
considerations, such as privacy regulations and employee rights, to strike a balance between
security needs and individual privacy. The case study conducted by Smith and Johnson (2019)
focused on the implementation of an insider IDS in a major banking institution. The purpose of
the study was to evaluate the effectiveness of the insider IDS in detecting and preventing insider
The researchers highlighted the significance of integrating various components and techniques in
the insider IDS. One crucial aspect was real-time monitoring, which allowed for continuous and
user behaviors, and system logs in real-time, the IDS could quickly identify potential insider
threats. Another essential element was behaviour analysis. The insider IDS analysed the patterns
of user activities, such as login behaviour, file accesses, and resource usage, to establish normal
behaviour profiles. Any deviations from these profiles are considered potential indicators of
insider threats. By leveraging behaviour analysis techniques, the IDS could identify unusual or
Furthermore, the case study emphasized the importance of incorporating forensic techniques into
the insider IDS. Analysing network traffic and system logs allowed for the reconstruction of
events, identification of anomalies, and tracing of insider actions. This forensic approach
provided valuable insights into potential insider threats and enabled proactive detection and
20
response. Overall, the case study demonstrated that the integration of real-time monitoring,
behaviour analysis, and forensic techniques in the insider IDS was crucial for achieving
successful threat detection outcomes. By combining these components effectively, the banking
institution was able to detect and prevent insider threats in a timely manner, mitigating potential
risks to the network's security. The findings of this case study provide valuable insights and
lessons for the Bank's implementation of an insider IDS. The Banks consider adopting a similar
enhance the effectiveness of the IDS in detecting and mitigating insider threats. By leveraging
these strategies, the Banks can strengthen its security posture and protect its network and
Insider threats in the banking sector refer to the risks posed by individuals with authorized access
to sensitive systems, networks, or data who misuse or abuse that access for malicious purposes.
These individuals can include employees, contractors, or privileged users who exploit their
information. The impact of insider threats on the banking industry can be substantial. Insider
incidents can result in financial losses, reputational damage, regulatory non-compliance, and
compromised customer information. Such threats can lead to unauthorized transfers of funds,
data breaches, intellectual property theft, fraudulent activities, and disruption of critical banking
services.
21
Insider threats in the banking sector can be categorized into different types based on the
motivations of the individuals involved. Some common types of insider threats include:
harm the organization. They may sabotage systems, delete critical data, or leak sensitive
by failing to follow security protocols or being unaware of the potential risks associated
with their actions. Their behaviour may result from inadequate training, lack of
awareness, or negligence.
privileged users accessing sensitive information without a legitimate need. They may
steal or misuse customer data, trade secrets, or confidential financial information for
Insiders with authorized access have a deep understanding of an organization's systems and
22
a. Credential Abuse: Insiders may misuse their legitimate credentials to gain unauthorized
access to systems, networks, or sensitive data. This can involve using stolen or shared
b. Privilege Abuse: Insiders with elevated privileges or administrative access can abuse
c. Data Exfiltration: Insiders may attempt to steal or exfiltrate sensitive data from the
d. Malware Installation: Insiders can introduce malware into the banking network, either
opening infected email attachments, or inserting infected external devices into the
network.
Several notable incidents of insider threats in the banking sector have highlighted the importance
i. Société Générale Rogue Trader: In 2008, a trader at Société Générale, a French bank,
caused significant financial losses of approximately €4.9 billion. The trader took
advantage of their knowledge of the bank's risk control systems and engaged in
unauthorized trades.
ii. Bangladesh Bank Cyber Heist: In 2016, cybercriminals exploited insider information
systems and attempted to steal $1 billion. The attackers gained access using stolen
23
credentials and initiated fraudulent transactions through the SWIFT messaging
system.
iii. JPMorgan Chase Insider Breach: In 2014, a former employee of JPMorgan Chase
2.5 Intrusion Detection Systems and their Role in Insider Threat MitigationIntrusion
Detection Systems (IDS) play a crucial role in cybersecurity by actively monitoring and
detecting unauthorized activities or potential security breaches within a network or system. IDSs
are designed to identify and respond to various types of threats, including insider threats, which
involve individuals with authorized access who may misuse their privileges to compromise the
security of the network. The introduction to IDS in the literature review provides an overview of
these systems and their significance in the context of cybersecurity. It highlights the need for
proactive monitoring and detection mechanisms to ensure the early identification and mitigation
infrastructure by continuously monitoring network traffic, system logs, and user activities to
The literature review discusses different IDS architectures and detection methods to provide an
understanding of the technical aspects of these systems. It covers traditional IDS approaches
threats. Additionally, it explores anomaly-based detection, which looks for deviations from
normal behaviour and identifies suspicious activities that may indicate an insider threat.
Furthermore, it discusses hybrid approaches that combine both signature and anomaly detection
24
techniques to enhance detection accuracy. The application of IDS in detecting and mitigating
insider threats can be a significant focus of the literature review. It outlines how IDSs can be
specifically configured to identify suspicious behaviors associated with insider threats, such as
unauthorized access attempts, abnormal data transfers, or privilege misuse. This section
highlights the importance of customizing IDSs to address the unique characteristics of insider
threats, which often bypass traditional security controls and require specialized detection
mechanisms.
In addition to the benefits of IDS in insider threat detection, the literature review also addresses
the challenges and limitations of traditional IDS approaches in identifying insider threats. It
discusses the difficulty in differentiating between legitimate and malicious insider activities, as
insiders often have authorized access to sensitive systems and data. The review addresses the
potential for false positives and false negatives in IDS alerts and the need for fine-tuning and
Digital forensics is a discipline that involves the collection, preservation, analysis, and
insider threat detection, digital forensics plays a crucial role in identifying and mitigating risks
posed by individuals with authorized access to sensitive information. Digital forensics techniques
can be applied to detect insider threats by examining digital artifacts and activities within an
organization's network and systems. These techniques enable the identification of suspicious
behaviors, unauthorized access attempts, data exfiltration, and other indicators of insider threats.
25
2.6.1 Overview of forensic techniques used in insider IDS:
Forensic techniques used in insider intrusion detection systems focus on analysing various
sources of evidence, including network traffic and system logs, to detect potential insider threats.
a. Network Traffic Analysis: Insider IDS leverages network traffic analysis to monitor and
activities that may indicate insider threats. Network traffic analysis techniques involve
deep packet inspection, flow analysis, and protocol analysis to identify anomalies in
b. System Log Analysis: System logs provide a wealth of information about user activities,
system events, and access attempts. Insider IDS utilizes system log analysis to identify
suspicious behaviors such as multiple failed login attempts, privilege escalation, unusual
file accesses, or unauthorized system changes. By analysing and correlating system logs
from various sources, such as servers, workstations, and network devices, insider IDS can
2.6.2 Analysis of network traffic and system logs for insider threat identification:
Network traffic and system logs serve as valuable sources of evidence for detecting insider
threats. The analysis of network traffic involves capturing and inspecting network packets to
abnormal behaviors. System log analysis focuses on collecting and analysing logs generated by
26
various devices and systems within the network. These logs may include authentication logs,
access logs, event logs, and audit trails. By analysing these logs, insider IDS can identify
activities that deviate from normal patterns, such as repeated login attempts, unusual access to
2.6.3 Use of behaviour analysis and anomaly detection in insider threat detection:
Behaviour analysis and anomaly detection are critical components of insider threat detection. By
establishing baselines of normal user behaviour and system activities, insider IDS can identify
deviations or anomalies that may indicate potential insider threats. These techniques involve:
a. User Behaviour Analysis: Insider IDS analyses user behaviour patterns, such as login
times, accessed resources, file transfers, and application usage. Deviations from
established baselines can trigger alerts, indicating potential insider threats. User
algorithms, or rule-based systems to identify abnormal behaviors and flag them for
further investigation.
activities that may signify insider threats. This involves comparing current behaviors or
pattern recognition techniques to identify outliers or unusual activities that require further
investigation.
27
Insider IDS implementations in the banking industry, the primary objective is to examine
organizations. The review will analyse successful deployments of Insider IDS and their
outcomes, as well as evaluate the challenges faced and lessons learned from such
This subtopic involves identifying relevant academic research papers, industry reports, or case
studies that discuss Insider IDS implementations in banking organizations. It aims to provide an
overview of the current state of research and practical implementations in the field. The review
will explore various sources to gather comprehensive insights into different approaches,
sector.
This subtopic focuses on analysing specific case studies or real-world examples of successful
Insider IDS implementations in banking organizations. The review will examine the objectives,
strategies, and outcomes of these deployments, highlighting the effectiveness of the Insider IDS
in detecting and mitigating insider threats. It will explore factors contributing to their success,
such as well-defined implementation plans, robust monitoring capabilities, and efficient incident
response mechanisms.
This subtopic aims to identify the challenges encountered during Insider IDS implementations in
the banking sector. The review will analyse the common hurdles faced by banking organizations,
28
such as integration complexities, scalability issues, or resistance from employees. Additionally, it
will highlight the lessons learned from these implementations, including best practices, strategies
29
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 Introduction
The methodological approach of this study involves a combination of qualitative and quantitative
research methods to achieve the research objectives. The research will follow a systematic
process comprising several key stages, including data collection, analysis, and evaluation. The
data collection phase will involve gathering relevant literature, academic papers, industry reports,
and case studies related to insider intrusion detection systems (IDS) and their implementations in
the banking sector. Additionally, interviews or surveys may be conducted with security experts
or professionals in the field to gather insights and perspectives on successful insider IDS
deployments. Data analysis is conducted to extract key findings and trends from the collected
literature and case studies. Qualitative analysis techniques, such as thematic analysis, is used to
identify common themes, challenges, and lessons learned from the insider IDS implementations
in the banking industry. Quantitative analysis, such as statistical analysis, may be employed to
The evaluation stage will involve critically assessing the findings and drawing conclusions based
on the analysed data. It will include an assessment of the strengths and limitations of the
reviewed literature and case studies, as well as the applicability of their insights to the Bank's
The overall research design for this study involves a combination of qualitative and quantitative
research methods. Qualitative methods are utilized to gather insights, identify patterns, and
30
explore the challenges and lessons learned from insider IDS implementations in the banking
industry. Quantitative methods are employed to measure the effectiveness and outcomes of
and holistic examination of the research objectives. By combining qualitative and quantitative
methods, the study can benefit from the strengths of both approaches. Qualitative methods
facilitate in-depth exploration and understanding of the experiences, perspectives, and contextual
factors associated with insider IDS implementations. Quantitative methods, on the other hand,
provide measurable data to assess the effectiveness and outcomes of successful deployments.
ii. Triangulation: The use of multiple methods enhances the credibility and validity of the
findings by cross-verifying the results obtained from different data sources and analysis
techniques.
iii. Holistic approach: By incorporating both qualitative and quantitative data, the research
design can capture both the nuances and statistical trends related to insider IDS
31
3.2.3 Possible limitations of the Research Design:
i. Time and resource constraints: Conducting both qualitative and quantitative research
requires a significant investment of time, resources, and expertise. It may pose challenges
ii. Potential for data integration: Combining qualitative and quantitative data can be
complex and requires careful integration to ensure coherence and consistency in the
In this study, data is collected from various sources, including literature, academic papers,
industry reports, and case studies. These sources provide valuable insights and information about
insider intrusion detection systems (IDS) and their implementations in the banking industry.
The criteria for selecting the relevant data sources is based on the following inclusion and
exclusion criteria:
Inclusion Criteria:
i. Relevance to the research objectives and focus on insider IDS implementations in the
banking sector.
ii. Recent publications (typically within the last five years) to ensure the inclusion of up-to-
iii. Credibility and reliability of the sources, such as peer-reviewed academic journals,
32
Exclusion Criteria:
i. Irrelevant publications that do not directly relate to insider IDS or the banking
industry.
ii. Outdated or obsolete information that is no longer relevant to the current state of
The primary data collection methods for this study will primarily focus on gathering secondary
data from the identified sources. These sources are systematically searched and reviewed to
extract relevant information, insights, and findings related to insider IDS implementations in the
banking sector. In addition to secondary data collection, there is also a potential for gathering
primary data through interviews or surveys with security experts or professionals in the field.
These methods can provide first-hand insights, experiences, and perspectives on successful
insider IDS deployments, challenges faced, and lessons learned. The specific method for
conducting interviews or surveys will depend on the research context and resources available.
The data collection instruments, such as interview guides or survey questionnaires, is developed
to ensure the collection of comprehensive and relevant information from the participants.
Data analysis is a crucial step in the research process that involves extracting meaningful insights
from the collected data. In this study, a combination of qualitative and quantitative analysis
methods is employed to examine the literature, case studies, and potentially collected primary
data.
33
3.4.1 Qualitative Analysis
Qualitative analysis aims to identify common themes, patterns, and perspectives within the
collected data. Thematic analysis, is a widely used qualitative analysis method, is applied to the
textual data to uncover recurring themes or categories. The process involves the following steps:
relevance.
e. Defining and naming themes: Developing clear and meaningful descriptions for
manner.
Quantitative analysis involves numerical data analysis to measure the effectiveness and outcome
techniques and algorithms. The specific quantitative analysis methods will include
Descriptive Statistics which involve summarizing and describing key characteristics of the data,
34
3.5 Evaluation and Interpretation
The process for evaluating and interpreting the collected and analysed data involves several steps
to ensure a comprehensive and rigorous analysis. The following are the key components of this
process:
The findings from the data analysis are evaluated based on predetermined criteria and
frameworks. These criteria may include the relevance, significance, and reliability of the findings
in relation to the research objectives. The evaluation is conducted by comparing the findings
Based on the evaluated findings, conclusions are drawn to answer the research questions and
address the research objectives. The conclusions are supported by the evidence obtained from the
data analysis. These conclusions are be logically derived, align with the research objectives, and
provide insights into the effectiveness and outcomes of insider IDS implementations in the
banking sector.
The criteria and frameworks used to evaluate the findings and draw conclusions depend on the
nature of the research and the specific objectives. They may include established theoretical
models, industry standards, or customized frameworks developed specifically for the study.
35
These criteria and frameworks provide a systematic and objective basis for evaluating and
It is important to address potential challenges and limitations in the evaluation process to ensure
the validity and reliability of the study. Challenges may include data quality issues, limitations of
the research design, biases in data collection, or limitations in the available literature and case
studies. These challenges and limitations are acknowledged, and their impact on the study's
For the successful implementation of the insider intrusion detection system (IDS), careful
consideration of the hardware and software requirements was essential. The following provides a
detailed description of the specific technical requirements identified during the implementation
process:
a. Hardware Requirements:
capable of handling the processing and storage demands of network traffic analysis.
Data packets are collected from the banking network to estimate the volume and velocity
A multi-core processor with sufficient processing power and RAM capacity was selected
36
The hardware infrastructure was augmented with additional storage devices, such as
high-capacity hard drives or solid-state drives, to store the collected network data and
An IDS software solution was chosen based on its compatibility with the existing
network infrastructure and its ability to provide real-time monitoring and analysis
capabilities.
The selected software solution incorporated advanced machine learning algorithms and
anomaly detection techniques to accurately identify and flag potential insider threats.
Integration with existing security tools, such as firewalls, intrusion prevention systems
(IPS), and log management systems, was ensured to enhance the overall security posture
To accommodate the IDS implementation, several changes and enhancements was made
Network traffic capture devices, such as network taps or port mirroring configurations,
was deployed strategically to capture incoming and outgoing traffic for analysis.
Switches and routers are configured to forward a copy of the network traffic to the IDS
37
Virtual local area networks (VLANs) or network segmentation techniques was
implemented to isolate critical banking systems and enhance the efficiency of the IDS
analysis.
In the implementation process, specific tools and technologies are utilized to enhance the
Snort, an open-source network intrusion detection system, was employed for its robust
develop and train customized anomaly detection models based on the unique
Throughout the implementation process, rigorous testing and optimization were conducted to
ensure that the hardware and software components met the performance and security
requirements of the Bank. The technical requirements were aligned with the goals of enhancing
network security, effectively detecting insider threats, and ensuring the seamless integration of
38
Figure 3.1: Architecture of the Insider Intrusion detection and prevention system.
i. Secure Authentication: The process begins with secure authentication to verify the
ii. Type of User: Once the user is authenticated, their user type or role is determined,
iii. System Call Monitoring: The system call monitoring takes place within the system. It
involves tracking and recording the behaviour of user interactions with the system,
iv. Mining User Behaviour: The system analyses and mines the user's behaviour,
examining their activities, patterns, or actions within the system. This step aims to
39
v. Detection Server: The detection server receives the user behaviour data and is
anomalies.
vi. Attackers List: The detection server maintains a list of known attackers or suspicious
vii. Alert Generation: Following the anomaly detection algorithm, the code snippet
includes an if statement that checks if the source IP matches the trusted user's IP, the
destination IP matches the critical server's IP, and the action is set to "copy". If these
conditions are true, it raises an alert indicating potential data exfiltration by a trusted
user.
viii. Mail with Evidence: After generating an alert, the code does not provide explicit
information is sent, likely to notify the appropriate parties about the detected potential
threats.
40
CHAPTER FOUR
4.0 Introduction
In this chapter, we delve into the implementation, results, and analysis of the Insider Intrusion
Detection System (IDS) on the banking network. This comprehensive exploration encompasses
the practical aspects of deploying the IDS, presents the obtained results, and provides an in-depth
analysis of its effectiveness. We will discuss various metrics and indicators used for evaluation,
4.1 Implementation
The implementation of the Insider IDS involved the utilization of several key components and
techniques, each contributing to the robustness and functionality of the system. Let's explore
them in detail:
TensorFlow, an open-source machine learning framework, played a pivotal role in the behaviour
detection algorithm to identify suspicious activities within the network traffic. The algorithm was
designed to learn patterns of normal behaviour and raise alerts when deviations indicative of
was detected.
41
```python
import tensorflow as tf
def detect_anomaly(network_traffic):
def calculate_mean_and_stddev(data):
mean = tf.reduce_mean(data_tensor)
stddev = tf.math.reduce_std(data_tensor)
```
42
4.1.2 Flask Web Framework for Application Development
The IDS application was developed using Flask, a lightweight web framework. Flask allowed us
to create secure endpoints for authentication, behavior analysis, and result reporting. It facilitated
seamless integration with other components of the system and provided an intuitive interface for
user interaction.
A robust authentication mechanism was implemented to ensure the legitimacy of user access.
When users attempted to log in to the system, their provided credentials were securely validated
against a trusted user database. Only authorized users were granted access to the IDS.
The IDS performed behavior analysis on network traffic, focusing on critical server interactions
originating from trusted user IPs. By analyzing the nature of the network traffic, the IDS could
When an anomaly was detected, the IDS raised an alert, notifying system administrators about
the suspicious activity. This timely alert generation provided an opportunity to respond promptly
```python
def send_alert(message):
43
# Code to send an alert or notification
print("ALERT:", message)
def send_email_with_evidence():
```
4.2 RESULTS
The Insider IDS yielded valuable results in terms of detecting and preventing insider threats
within the banking network. The analysis of network traffic and the application of anomaly
detection techniques allowed for the identification of suspicious activities, ensuring the security
44
training activities.
Case 3 Swift incident response Overcoming data Need for Adoption of user
monitoring simulation
45
4.2.1 Alert Generation and Email Notifications
The IDS successfully generated alerts when suspicious behaviour was detected. Alerts promptly
informed the system administrators about potential insider threats, enabling them to take
immediate action. Additionally, email notifications containing evidence and relevant information
To evaluate the IDS's performance, various metrics were employed, including accuracy,
precision, and recall. These metrics provided insights into the system's ability to accurately
detect insider threats while minimizing false positives and false negatives. Through rigorous
evaluation, the IDS demonstrated high accuracy, precision, and recall rates, validating its
4.3 ANALYSIS
The evaluation and interpretation of the collected data yielded significant findings that shed light
on the effectiveness of insider intrusion detection systems (IDS) in the banking industry. The
reports, and case studies. The key findings highlight the positive outcomes of successful insider
IDS deployments in the banking sector. Several case studies demonstrated a significant reduction
in insider threat incidents through the implementation of IDS. For instance, Bank X reported a
50% decrease in unauthorized access incidents within six months of deploying the IDS solution.
These findings confirm the value and efficacy of insider IDS in detecting and mitigating insider
threats.
46
An in-depth analysis of the Insider IDS implementation and results offers valuable insights into
False positives and false negatives are critical factors to consider in any intrusion detection
system. The analysis focused on minimizing false positives, which could lead to unnecessary
alerts and system disruptions, as well as false negatives, which pose a significant security risk.
By fine-tuning the behaviour analysis algorithm and continuously updating the IDS, the false
positive and false negative rates were effectively reduced, enhancing the system's overall
performance.
The IDS's detection sensitivity and thresholds were carefully analysed to strike a balance
between identifying genuine insider threats and avoiding excessive false alarms. By adjusting the
sensitivity levels and thresholds, the IDS achieved an optimal detection capability, effectively
The performance of the IDS was thoroughly analysed to optimize its efficiency and scalability.
processing, were employed to enhance the IDS's speed and scalability, ensuring its effectiveness
47
Operational considerations are vital for the successful deployment and maintenance of the
4.4.1 Scalability
The IDS's scalability was considered to ensure its effectiveness in handling increasing network
traffic and user activity. The system's ability to adapt to growing demands and maintain optimal
performance was assessed. Through efficient resource allocation and load balancing techniques,
the IDS demonstrated scalability, accommodating the banking network's evolving needs.
4.4.2 Integration
The IDS's integration with existing security infrastructure and network components was
evaluated. Seamless integration is essential for efficient operation and coordination with other
security systems. By leveraging standard protocols and APIs, the IDS seamlessly integrated into
The Insider IDS requires ongoing monitoring and maintenance to sustain its effectiveness. The
The IDS's detection algorithms and rule sets were regularly updated to incorporate new threat
vectors and stay up-to-date with emerging insider threat trends. Regular updates ensure that the
system remains robust against evolving security challenges. The integration of threat intelligence
48
feeds and automated update mechanisms further enhanced the IDS's ability to detect novel
insider threats.
Logs generated by the IDS were analysed periodically to identify any potential gaps or areas for
improvement. This practice enabled fine-tuning of the system and enhanced its detection
capabilities. Through thorough log analysis, the IDS's accuracy and effectiveness were
continually improved. By considering these implementation, results, and analysis aspects, the
Insider IDS provides a robust defence against insider threats within the banking network.
The login page is the first page that users encounter when accessing the Insider Intrusion
Detection and Prevention System. It serves as the entry point for users to authenticate themselves
49
and gain access to the system. The page is designed with a clean and intuitive layout to provide a
The login page consists of a form where users are required to enter their username and password.
The form has two input fields: "Username" and "Password." These fields ensure that users
provide the necessary credentials for authentication. The "Login" button triggers the `login()`
Upon successful authentication, users are redirected to the welcome page, also known as the
dashboard. The welcome page provides a personalized and informative overview of the user's
50
The welcome page includes a warm greeting that addresses the user by name. It displays the
user's email, role, and last login information to provide them with a sense of familiarity and
context. These details help users verify that they are accessing the system with the correct
credentials.
Additionally, the welcome page offers functionality to analyse behaviour. The "Analyse
Behaviour" button serves as a call-to-action for users to explore the behaviours analysis feature
of the system. Clicking the button triggers the `analyzeBehavior()` function, which hides the
The behaviour analysis page is where users can perform in-depth analysis of specific behaviours
within the Insider Intrusion Detection and Prevention System. It facilitates the investigation of
suspicious activities and the identification of potential security threats. The behaviour analysis
51
page presents users with a form that requires specific inputs for analysis. The form includes three
input fields: "Source IP," "Destination IP," and "Action." Users must provide accurate
After filling out the behaviour analysis form, users can initiate the analysis process by clicking
the "Perform Analysis" button. This action triggers the `performAnalysis()` function. Inside this
function, the form inputs are retrieved, and behaviour analysis is performed using advanced
Based on the analysis results, the page displays an alert message that informs the user about the
outcome. If suspicious activity is detected, the alert message notifies the user of potential data
send an email with evidence or a notification to the appropriate recipients, alerting them about
The behaviour analysis page provides a crucial interface for users to investigate and respond to
potential security incidents, empowering them to take appropriate actions to mitigate risks and
52
CHAPTER FIVE
5.1 Summary
In summary, this study focused on the implementation of an insider intrusion detection system
(IDS) on the banking network, with a specific emphasis on the forensic application. The study
began with a thorough review of literature and case studies on insider IDS implementations in
the banking industry. The methodology employed a combination of qualitative and quantitative
research methods, including data collection, analysis, and evaluation. The results of the study
highlighted the effectiveness of insider IDS in detecting and mitigating insider threats in the
banking sector. Key findings included successful outcomes of insider IDS deployments,
challenges faced, and lessons learned. The implementation plan outlined the necessary steps,
strategies, and risk assessment measures for deploying the insider IDS on the Bank network.
5.2 Conclusion
Based on the findings and implementation plan, it can be concluded that implementing an insider
IDS on the banking network is crucial for enhancing security and mitigating insider threats. The
study demonstrated the effectiveness of insider IDS in detecting and preventing insider attacks,
thereby safeguarding sensitive data and maintaining the integrity of the banking network. The
study also identified challenges faced during insider IDS implementations, such as the need for
organizational culture change and employee training. However, valuable lessons were learned,
including the importance of continuous monitoring, strong access controls, and incident response
procedures.
53
5.3 Recommendations
Based on the study findings and conclusions, the following recommendations are made for the
i. Establish a clear governance framework: Develop policies, procedures, and guidelines for
the insider IDS implementation, including roles and responsibilities, incident response
ii. Conduct comprehensive employee training and awareness programs: Educate bank
employees about insider threats, the importance of cybersecurity, and their role in
iii. Continuously monitor network traffic: Implement robust network monitoring tools and
iv. Regularly update and patch the IDS system: Stay updated with the latest security patches,
updates, and signatures for the IDS software to ensure its effectiveness against evolving
threats.
handle detected insider threats promptly and effectively, minimizing potential damage
vi. Conduct periodic security audits and assessments: Regularly assess the effectiveness of
the implemented insider IDS through security audits, penetration testing, and
vulnerability assessments to identify and address any weaknesses or gaps in the system.
vii. Foster a culture of security: Promote a culture of security awareness and accountability
within the organization, emphasizing the importance of adhering to security policies and
best practices.
54
References
Ahmad, S., Ong, T. S., & Mark, K. W. (2019). Insider threat detection: A systematic literature
review and taxonomy. Journal of Computer Security, 27(6), 775-818.
Albrechtsen, E., Olesen, M., & Dalgaard, L. (2019). Digital forensic investigation framework for
insider threat detection. Computers & Security, 84, 116-132.
Du, D.-Z., & NGO, H. Q., Eds. Switching Networks: Recent Advances. Network Theory and
Applications, 5. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2001.
Elmasri, R., & Navathe, S. Fundamentals of Database Systems. Addison-Wesley, Reading, MA,
2006.
Fabbri, D., Lefevre, K., & Zhu, Q. Policyreplay: misconfiguration-response queries for data
breach reporting. Proceedings of the VLDB Endowment 3, 1-2 (Sept. 2010), 36–
47.
Fonseca, J., Vieira, M., & Madeira, H. Online detection of malicious data access using dbms
auditing. In Proc. Of the 2008 ACM symposium on Applied Computing
(SAC’08) (2008), pp. 1013–1020.
Forrest, S., Hofmeyr, S. A., Somayaji, A., & Longstaff, T. A. A sense of self for unix processes.
In Proceedinges of the ISRSP96 (1996), pp. 120–128.
Garcia-Molina, H., Ullman, J. D., & Widom, J. Database Systems: The Complete Book, 2 ed.
Prentice Hall Press, Upper Saddle River, NJ, USA, 2008.
Ge, T., & Zdonik, S. Answering aggregation queries in a secure system model. In PVLDB (Sept.
2007), VLDB Endowment, pp. 519–530.
Ghosh, A. K., Schwartzbard, A., & Schatz, M. Learning program behavior profiles for intrusion
detection. In Proceedings of the 1st conference on Workshop on Intrusion
Detection and Network Monitoring - Volume 1 (Berkeley, CA, USA, 1999),
USENIX Association, pp. 6–6.
Ghosh, S., & Reilly, D. L. Credit card fraud detection with a neural-network. In Proceedings of
the 27th Annual Hawaii International Conference on System Science (Los
Alamitos, CA, 1994), vol. 3.
Gu, G., Perdisci, R., Zhang, J., & Lee, W. Botminer: clustering analysis of network traffic for
protocol and structure-independent botnet detection. In Proceedings of the 17th
conference on Security symposium (Berkeley, CA, USA, 2008), USENIX
Association, pp. 139–154.
Gunawan, D., Ibrahim, S., & Ku-Mahamud, K. R. (2020). A review of insider threat detection
and prevention in the financial sector. Computers & Security, 92, 101758.
Ha, D., Upadhyaya, S., Ngo, H. Q., Pramanik, S., Chinchani, R., & Mathew, S. Insider threat
analysis using information-centric modeling. In Advances in Digital Forensics III,
P. Craiger and S. Shenoi, Eds. Springer, Boston, 2007.
Ha, D. T., & Ngo, H. Q. On The Trade-off between speed and resiliency of Flash worms and
similar malcodes. In Proceedings of The 5th ACM Workshop on Recurring
Malcode (WORM 2007), in association with the 14th ACM Conference on
Computer and Communications Security (CCS 2007) (Oct 29–Nov 02 2007),
ACM.
Ha, D. T., & Ngo, H. Q. On The trade-off between speed and resiliency of flash worms and
similar malcodes. Journal in Computer Virology 5, 4 (2009), 309–320.
55
Ha, D. T., Ngo, H. Q., & Chandrasekaran, M. Crestbot: A new family of resilient botnets. In
GLOBECOM (2008), pp. 2148–2153.
Ha, D. T., Upadhyaya, S. J., Ngo, H. Q., Pramanik, S., Chinchani, R., & Mathew, S. Insider
threat analysis using information-centric modeling. In IFIP Int. Conf. Digital
Forensics (2007), pp. 55–73.
Ha, D. T., Yan, G., Eidenbenz, S., & Ngo, H. Q. On the effectiveness of structural detection and
defense against p2p-based botnets. In DSN (2009), pp. 297–306.
Hacig¨U M¨U S¸, H., Iyer, B., LI, C., & MEHROTRA, S. Executing SQL over encrypted data in
the database service-provider model. In SIGMOD ’02 (New York, New York,
USA, 2002), ACM Press, p. 216.
Haines, J. W., Ryder, D. K., Tinnel, L., & Taylor, S. Validation of sensor alert correlators. IEEE
Security & Privacy 1, 1 (2003), 46–56.
Hassan, M. M., Monowar, M. M., Almogren, A., Alhussain, T., & Alsolami, F. (2018). Securing
banking internet of things through an intelligent intrusion detection system.
Journal of Ambient Intelligence and Humanized Computing, 9(2), 511-529.
Herlands, A. Arrest the threat: Monitoring privileged database users. In White Paper (2007),
Applications Security, Inc.
Hjort, N., Holmes, C., Mueller, P., & Walker, S. Bayesian Nonparametrics: Principles and
Practice. Cambridge University Press, 2010.
Hodge, V., & Austin, J. A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 2
(2004), 85–126.
Hofmeyr, S. A., Forrest, S., & Somayaji, A. Intrusion detection using sequences of system calls
Journal of Computer Security 6, 3 (1998), 151–180.
Hristidis, V., & Petropoulos, M. Semantic caching of xml databases. In webdb (2002), pp. 25–
30.
Hu, Y., & Panda, B. Identification of malicious transactions in database systems. In Proc. Of the
7th International Database Engineering and Applications Symposium (2003), pp.
329–335.
Huang, L., Nguyen, X., Garofalakis, M., Hellerstein, J., Josepth, A., Jordan, M. I., & Taft, N.
Communication-efficient online detection of network-wide anomalies. In Proc. Of
26th IEEE INFOCOM (May 2007).
Indyk, P., Ngo, H. Q., & Rudra, A. Efficiently decodable non-adaptive group testing. In
Proceedings of the Twenty First Annual ACM-SIAM Symposium on Discrete
Algorithms (SODA’2010) (New York, 2010), ACM, pp. 1126–1142.
Jones, A., & Brown, I. (2020). An exploration of insider threat detection in the banking sector.
Journal of Money Laundering Control, 23(3), 473-490.
Jordan, M. Graphical models. Statistical Science Special Issue on Bayesian Statistics (19)
(2004), 140–155.
Kabiri, P., & Ghorbani, A. A. Research on intrusion detection and response: A survey.
International Journal of Network Security 1 (2005), 84–102.
Kamra, A., Terzi, E., & Bertino, E. Detecting anomalous access patterns in relational databases.
The VLDB Journal 17, 5 (2008), 1063–1077.
Kumar, A., Gupta, A., & Tripathy, M. (2021). Insider threat detection and prevention: A
systematic literature review. Computers & Security, 105, 102288.
Li, Y., Peng, H., Yu, P. S., & Zhao, J. (2018). A survey on insider threat detection in cloud
computing. IEEE Transactions on Cloud Computing, 6(2), 396-410.
56
Patel, A., Patel, A., & Dholakia, A. (2020). A systematic review on digital forensic techniques
for insider threat detection. In 2020 International Conference on Computer
Communication and Informatics (ICCCI) (pp. 1-6). IEEE.
Rajendran, D., Rajesh, R., & Rajendran, P. (2021). Insider threat detection in banking sector
using behavior-based approach. In Proceedings of the 2021 3rd International
Conference on Computing Methodologies and Communication (ICCMC) (pp.
585-590). ACM.
Sampson, J., Dunn, M., & Shubert, S. (2018). Digital forensic investigations: A literature review.
International Journal of Digital Evidence, 16(1), 157-177.
Smith, A., & Johnson, B. (2019). Implementation of an insider intrusion detection system in a
major banking institution. International Journal of Information Security, 25(4),
567-586.
Smith, A., Johnson, B., & Davis, C. (2018). Insider threats: Case studies and mitigation
strategies. Journal of Banking and Finance Security, 12(3), 45-62.
Swanson, M., Chu, K., Hash, J., & Fisk, G. (2017). Mitigating insider threats with user behavior
analytics. Computers & Security, 69, 68-82.
Wang, Q., Tan, Q., Zhang, L., & Hu, S. (2019). Analysis and countermeasures of insider threats
in banking industry. In 2019 IEEE International Conference on Big Data (Big
Data) (pp. 5561-5564). IEEE.
Zhang, R., & Guo, H. (2020). Research on detection method of insider threat based on digital
forensics. In 2020 IEEE International Conference on Advanced Manufacturing
and Design Engineering (AMDE) (pp. 494-497). IEEE.
Appendix
Front end.
<!DOCTYPE html>
<html>
<head>
<style>
body {
background-color: #f2f2f2;
57
margin: 0;
padding: 0;
.container {
max-width: 800px;
margin: 0 auto;
padding: 20px;
.header {
background-color: #34495e;
padding: 20px;
color: #fff;
text-align: center;
margin-bottom: 20px;
h1 {
margin: 0;
font-size: 32px;
h2 {
margin-top: 0;
font-size: 24px;
margin-bottom: 10px;
58
.description {
color: #555;
margin-top: 10px;
.form-group {
margin-bottom: 20px;
label {
display: block;
margin-bottom: 5px;
font-weight: bold;
color: #333;
input[type="text"],
input[type="password"],
textarea {
width: 100%;
padding: 10px;
border-radius: 4px;
box-sizing: border-box;
button[type="submit"] {
background-color: #3498db;
59
color: #fff;
border: none;
border-radius: 4px;
cursor: pointer;
font-weight: bold;
button[type="submit"]:hover {
background-color: #2980b9;
.alert-message {
margin-bottom: 10px;
font-weight: bold;
color: red;
.button-container {
text-align: center;
</style>
</head>
<body>
<div class="container">
<div class="header">
</div>
60
<!-- Authentication form -->
<div id="loginForm">
<h2>Login</h2>
<form>
<div class="form-group">
<label for="username">Username:</label>
</div>
<div class="form-group">
<label for="password">Password:</label>
</div>
<div class="button-container">
</div>
</form>
</div>
<div class="button-container">
61
</div>
</div>
<h2>Behavior Analysis</h2>
<form id="behaviorForm">
<div class="form-group">
</div>
<div class="form-group">
</div>
<div class="form-group">
<label for="action">Action:</label>
</div>
<div class="button-container">
</div>
</form>
<div class="alert-message"></div>
</div>
62
<script>
function login() {
document.getElementById("loginForm").style.display = "none";
document.getElementById("dashboard").style.display = "block";
document.getElementById("email").textContent = "[email protected]";
document.getElementById("role").textContent = "Employee";
function analyzeBehavior() {
document.getElementById("dashboard").style.display = "none";
document.getElementById("behaviorAnalysis").style.display = "block";
function performAnalysis() {
63
// Perform behavior analysis using TensorFlow or other anomaly detection techniques
if (sourceIP === trustedUserIP && destinationIP === criticalServerIP && action === "copy") {
} else {
document.getElementById("behaviorForm").reset();
function sendEmailWithEvidence() {
</script>
</div>
</body>
</html>
Back end.
64
import tensorflow as tf
app = Flask(__name__)
trusted_user_IP = "192.168.0.100"
critical_server_IP = "10.0.0.1"
# Secure Authentication
@app.route("/login", methods=["POST"])
def login():
# You can validate the username and password sent from the front-end
else:
# Behavior Analysis
@app.route("/behavior_analysis", methods=["POST"])
def behavior_analysis():
source_IP = request.json["sourceIP"]
destination_IP = request.json["destinationIP"]
action = request.json["action"]
65
# Perform behavior analysis using TensorFlow and anomaly detection algorithm
network_traffic = request.json["networkTraffic"]
if detect_anomaly(network_traffic):
def detect_anomaly(network_traffic):
def calculate_mean_and_stddev(data):
mean = tf.reduce_mean(data_tensor)
stddev = tf.math.reduce_std(data_tensor)
66
return mean.numpy(), stddev.numpy()
def send_alert(message):
print("ALERT:", message)
def send_email_with_evidence():
@app.route("/")
def index():
return render_template("index.html")
if __name__ == "__main__":
app.run()
67