Research Article

Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning

Table 1

Characteristic of each dimension for the extracted feature.

DimensionSubstanceAnnotation

0Whether use computer belongs to oneself1/0 stands for true/false
1Time of behavior, represented by avg-TINormalized to (0, 1)
2E-mail address sent to, represented by avg-TINormalized to [0, 1); 0 means do not send e-mail
3E-mail address received from, represented by avg-TINormalized to [0, 1); 0 means do not receive e-mail
4Name of operated file, represented by avg-TINormalized to [0, 1); 0 means do not operate files
5URL of the accessed website, represented by avg-TINormalized to [0, 1); 0 means do not access website
6Whether a log-on activity1/0 stands for true/false
7Whether a log-off activity1/0 stands for true/false
8Whether removable device connecting activity1/0 stands for true/false