Predictive Analytics for Insider Threats Using Multimodal Data (Log + Behavioural + Physical Security)

Authors

  • Kh Said Al Mamun Department of Science in Information Technology (MSIT), Washington University of Science and Technology (WUST), USA
  • Md Shadman Soumik Department of Science in Information Technology (MSIT), Washington University of Science and Technology (WUST), USA
  • Md Mukidur Rahman Department of Business Analytics, Southern New Hampshire University, USA
  • Mrinmoy Sarkar Department of Science in Information Technology (MSIT), Washington University of Science and Technology (WUST), USA
  • Chowdhury Amin Abdullah Department of Computer Science and Information Systems, Pace University, USA
  • Mohammad Ali Department of Science in Business Analytics, Trine University, USA
  • Md Shahadat Hossain Department of Science in Business Analytics, Trine University, USA

DOI:

https://doi.org/10.54536/ajiri.v4i3.6224

Keywords:

Behavioural Indicators, Cybersecurity Risk Management, Data Fusion, Insider Threats, Machine Learning, Multimodal Data, Organisational Resilience, Physical Security, Predictive Analytics, System Logs

Abstract

Insider threats are a continuous and dynamic issue in the field of organizational security that may take various forms, such as an abuse of authorized access to critical information systems and physical infrastructure. The traditional methods of isolating system log analysis, behavioural monitoring, or physical access control often do not have the ability to identify multi-layered and subtle patterns of threats. Multimodal data integration predictive analytics is a holistic approach since it integrates heterogeneous data volumes into coherent threat models that are able to pre-empt any possible threats before they escalate. The paper discusses the effectiveness of predictive analytics in insider threat detection through analysis of the connection between log records, behavioural indicators and physical security data. Instead, the focus is made on designing integrative frameworks, using advanced machine learning algorithms, and the applied implications on operational resilience. Issues like scalability, transparency of algorithms, and even ethical considerations are also critical issues that are considered to provide a sound deployment in the modern security environment. The paper highlights the need to embrace multimodal predictive approaches as a tactical defence mechanism and developing theoretical arguments and practical interventions in cybersecurity risk management.

Downloads

Download data is not yet available.

References

Amuda, O. K., Akinyemi, B. O., Sanni, M. L., & Aderounmu, G. A. (2022). A predictive user behaviour analytic model for insider threats in cyberspace. International Journal of Communication Networks and Information Security (IJCNIS), 14(1). https://doi.org/10.17762/ijcnis.v14i1.5208

Bin Sarhan, B., & Altwaijry, N. (2023). Insider threat detection using a machine learning approach. Applied Sciences, 13(1), 259. https://doi.org/10.3390/app13010259

Brdiczka, O., Liu, J., Price, B., Shen, J., Patil, A., Chow, R., & Bart, E. (2012). Proactive insider threat detection through graph learning and psychological context. 2012 IEEE Symposium on Security and Privacy Workshops, 142–149. https://doi.org/10.1109/SPW.2012.33

Carter, L., & Katz, J. (2019). Machine learning applications in security analytics: An overview. International Journal of Information Security, 18(5), 469–482. https://doi.org/10.1007/s10207-019-00446-0

Chattopadhyay, S., & Bandyopadhyay, S. (2020). Insider threat detection using deep learning techniques. Computers & Security, 92, 101760. https://doi.org/10.1016/j.cose.2020.101760

Cole, E., & Ring, S. (2005). Insider threat: Protecting the enterprise from sabotage, spying, and theft. Syngress. https://doi.org/10.1016/B978-159749021-0/50003-1

DANTE: Predicting insider threat using LSTM on system logs [Preprint]. (2021). arXiv. https://doi.org/10.48550/arXiv.2102.05600

Song, S., Gao, N., Zhang, Y., & Ma, C. (2024). BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. Cybersecurity, 7(1), 2. https://doi.org/10.1186/s42400-023-00190-9

Gheyas, I. A., & Abdallah, A. E. (2016). Detection and prediction of insider threats to cyber security: A systematic literature review and meta-analysis. Big Data Analytics, 1(6), 1–29. https://doi.org/10.1186/s41044-016-0006-0

Greitzer, F. L., & Frincke, D. A. (2010). Combining traditional cyber security audit data with psychosocial data: Towards predictive modeling for insider threat mitigation. Insider Threats in Cyber Security, 49, 85–113. https://doi.org/10.1007/978-1-4419-7133-3_5

Greitzer, F. L., & Hohimer, R. E. (2011). Modeling human behavior to anticipate insider attacks. In S. Satapathy, A. Joshi, N. Modi, & N. Pathak (Eds.), ICT for Sustainable Development, Advances in Intelligent Systems and Computing, 409 (pp. 24–47). Springer. https://doi.org/10.1007/978-981-10-0135-2_34

Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., & Ochoa, M. (2019). Insight into insiders and IT: A survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Computing Surveys, 52(2), 1–40. https://doi.org/10.1145/3303771

Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., & Gritzalis, D. (2010). An insider threat prediction model. Trust, Privacy and Security in Digital Business, 6264, 26–37. https://doi.org/10.1007/978-3-642-15152-1_3

Liu, J., Kuhn, R., & Ross, R. (2018). Insider threat detection using system logs. IEEE Security & Privacy, 16(2), 26–34. https://doi.org/10.1109/MSP.2018.1870874

Magklaras, G., & Furnell, S. (2002). Insider threat prediction tool: Evaluating the probability of IT misuse. Computers & Security, 21(1), 62–73. https://doi.org/10.1016/S0167-4048(02)00506-0

Mishra, S., & Varadharajan, V. (2021). Multimodal machine learning for cybersecurity applications. Future Generation Computer Systems, 125, 691–706. https://doi.org/10.1016/j.future.2021.06.004

Moore, A., Cappelli, D., & Trzeciak, R. (2008). The “big picture” of insider IT sabotage across U.S. critical infrastructures. Proceedings of the 2008 International Conference on Software Engineering, 493–502. https://doi.org/10.1145/1368088.1368155

Nasir, R., Afzal, M., Latif, R., & Iqbal, W. (2021). Behaviour-based insider threat detection using deep learning. IEEE Access, 9, 3118297. https://doi.org/10.1109/ACCESS.2021.3118297

Park, Y., & Lee, H. (2020). Data fusion techniques for anomaly detection in cyber–physical systems. Sensors, 20(23), 6900. https://doi.org/10.3390/s20236900

Pennada, S. S. P., Nayak, S. K., & M. V. K. (2025). Insider threat detection using behavioural analysis through machine learning and deep learning techniques. International Research Journal of Multidisciplinary Technovation, 7(2), 74–86. https://doi.org/10.54392/irjmt2527

Racherache, B., Shirani, P., & Soeanu, A. (2023). Insider threat detection using supervised machine learning algorithms on an extremely imbalanced dataset. Computers & Security, 125, 103350. https://doi.org/10.1016/j.cose.2023.103350

Sanzgiri, A., & Dasgupta, D. (2016). Classification of insider threat detection techniques. 2016 IEEE Symposium on Technologies for Homeland Security, 1–6. https://doi.org/10.1109/THS.2016.7568904

Shu, X., & Yao, D. (2016). Data leak detection as a service. IEEE Transactions on Services Computing, 9(1), 75–87. https://doi.org/10.1109/TSC.2015.2390670

Song, C., & Zheng, J. (2025). Insight-LLM: LLM-enhanced multi-view fusion in insider threat detection [Preprint]. arXiv. https://doi.org/10.48550/arXiv.2509.01509

Stolfo, S., Bellovin, S., Hershkop, S., Keromytis, A., Smith, S., & Sinclair, S. (2008). Insider attack and cybersecurity: Beyond the hacker. Advances in Information Security, 39. https://doi.org/10.1007/978-0-387-77322-3

Wang, H., Wang, Y., & Yang, G. (2013). A predictive model of insider threat based on a Bayesian network. International Journal of Online and Biomedical Engineering, 9(S4), 69–74. https://doi.org/10.3991/ijoe.v9iS4.2660

Weiland, T., Legg, P., & Nurse, J. (2021). Insider threat detection using context-aware anomaly detection. Journal of Cybersecurity, 7(1), taab004. https://doi.org/10.1093/cybsec/taab004

Downloads

Published

2025-11-21

How to Cite

Predictive Analytics for Insider Threats Using Multimodal Data (Log + Behavioural + Physical Security). (2025). American Journal of Interdisciplinary Research and Innovation, 4(3), 82-90. https://doi.org/10.54536/ajiri.v4i3.6224

Similar Articles

1-10 of 86

You may also start an advanced similarity search for this article.