Designing a Novel Insider Threat Model for Enhanced Cybersecurity

Year : 2023 | Volume : 01 | Issue : 02 | Page : 27-31

    Manas Kumar Yogi

  1. Assistant Professor, Department of Computer Science & Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India


Designing a novel insider threat model is a critical imperative in the realm of cybersecurity. As organizations face an ever-expanding threat landscape, insider threats, whether deliberate or inadvertent, present a formidable challenge to the safeguarding of sensitive data and critical assets. This abstract encapsulates the significance, challenges, and innovations inherent in crafting an effective insider threat model for enhanced cybersecurity. The necessity for novel insider threat models arises from the recognition that traditional security measures often overlook the dangers posed by trusted insiders. This paper explores the multifaceted domain of designing such models, emphasizing their proactive nature and adaptability to evolving security threats. The complexities of this endeavour are magnified by several challenges, ranging from acquiring high-quality data and maintaining compliance with privacy regulations to addressing false positives and combating evolving attack vectors. Additionally, the model’s efficacy depends on a deep understanding of contextual information, user behavior profiling, and the ability to differentiate between normal and anomalous activities. It also requires striking a delicate balance between security and privacy, respecting ethical and legal standards while gaining the trust of employees and stakeholders. Innovations in insider threat modeling encompasses a comprehensive approach, integrating advanced machine learning algorithms, user and entity behavior analytics, and adaptive learning to create a dynamic defense against insider threats. This paper underscores the necessity of continuous improvement, collaboration between experts from diverse domains, and awareness of evolving threats and best practices.

Keywords: Insider threat, Cyber Security, Privacy, Malicious, threat model, safeguard

[This article belongs to International Journal of Information Security Engineering(ijise)]

How to cite this article: Manas Kumar Yogi Designing a Novel Insider Threat Model for Enhanced Cybersecurity ijise 2023; 01:27-31
How to cite this URL: Manas Kumar Yogi Designing a Novel Insider Threat Model for Enhanced Cybersecurity ijise 2023 {cited 2023 Dec 06};01:27-31. Available from:

var fieldValue = “[user_role]”;
if (fieldValue == ‘indexingbodies’) {
document.write(‘Full Text PDF‘);
else if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }
else if (fieldValue == ‘ijise’) { document.write(‘Full Text PDF‘); }
else { document.write(‘ ‘); }


  1. Anderson R. Security engineering: a guide to building dependable distributed systems. John Wiley & Sons; 2020 Nov 25.
  2. Swinhoe D. What is an insider threat? 7 warning signs to watch for. CSO Online. CSO Online; 2018. Available from:
  3. Chan TK, Chin CS, Chen H, Zhong X. A comprehensive review of driver behavior analysis utilizing smartphones. IEEE Transactions on Intelligent Transportation Systems. 2019 Sep 19;21(10):4444-75.
  4. Keeney M, Kowalski E, Cappelli D, Moore A, Shimeall T, Rogers S. Insider threat study: Computer system sabotage in critical infrastructure sectors. Washington, DC: United States Secret Service; 2005 May 1.
  5. Nicolaou A, Shiaeles S, Savage N. Mitigating insider threats using bio-inspired models. Applied Sciences. 2020 Jul 22;10(15):5046.
  6. Shafiullah M, Refat AM, Haque ME, Chowdhury DM, Hossain MS, Alharbi AG, Alam MS, Ali A, Hossain S. Review of recent developments in microgrid energy management strategies. Sustainability. 2022 Nov 9;14(22):14794.
  7. Spitzner L. Honeypots: tracking hackers. Reading: Addison-Wesley; 2003 Sep.
  8. Al-Mhiqani MN, Ahmad R, Abidin ZZ, Abdulkareem KH, Mohammed MA, Gupta D, Shankar K. A new intelligent multilayer framework for insider threat detection. Computers & Electrical Engineering. 2022 Jan 1;97:107597.
  9. Force JT. Security and privacy controls for information systems and organizations. National Institute of Standards and Technology; 2017 Aug 15.
  10. Verkijika SF, De Wet L. E-government adoption in sub-Saharan Africa. Electronic Commerce Research and Applications. 2018 Jul 1;30:83-93.

Regular Issue Subscription Review Article
Volume 01
Issue 02
Received October 29, 2023
Accepted November 27, 2023
Published December 6, 2023

function myFunction2() {
var x = document.getElementById(“browsefigure”);
if ( === “block”) { = “none”;
else { = “Block”; }
document.querySelector(“.prevBtn”).addEventListener(“click”, () => {
document.querySelector(“.nextBtn”).addEventListener(“click”, () => {
var slideIndex = 1;
function changeSlides(n) {
showSlides((slideIndex += n));
function currentSlide(n) {
showSlides((slideIndex = n));
function showSlides(n) {
var i;
var slides = document.getElementsByClassName(“Slide”);
var dots = document.getElementsByClassName(“Navdot”);
if (n > slides.length) { slideIndex = 1; }
if (n ( = “none”));
item => (item.className = item.className.replace(” selected”, “”))
slides[slideIndex – 1].style.display = “block”;
dots[slideIndex – 1].className += ” selected”;