MACHINE LEARNING FOR INSIDER ATTACK DETECTION IN CLOUD SYSTEMS
Insider attacks are honestly one of the scariest problems in cloud security right now. Why? Because the attacker already has a legitimate username and password. They are not breaking in — they are already inside. Most companies spend millions on firewalls and intrusion detection systems, but those tools are almost blind when an employee decides to steal data or sabotage systems. After talking to security teams from three different organizations, we realized how frustrated they were. Their alert systems were generating so much noise that real threats got lost. So we built a machine learning system that actually works for insider detection in cloud systems. We combined supervised learning (Random Forest and XGBoost) for catching known attack patterns and unsupervised learning (Isolation Forest and Autoencoders) for spotting completely new, never-seen-before insider behaviors. We trained and tested on the CERT insider threat dataset plus real cloud logs from a partner company. The results came out really well — 96.2% detection accuracy with only 3.8% false positives. That is a huge improvement over traditional rule-based systems. The best part? Our system explains why it raised an alert, so security analysts actually trust it. This framework is ready for real-world cloud deployment.
Kumar, S. (2026). Machine Learning for Insider Attack Detection in Cloud Systems. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.234
Kumar, Saurav. "Machine Learning for Insider Attack Detection in Cloud Systems." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.234.
Kumar, Saurav. "Machine Learning for Insider Attack Detection in Cloud Systems." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.234.
2.Liu, O. De Vel, Q. L. Han, and M. Hussain, ”Detecting insider threats using machine learning: A systematic review,” ACM Computing Surveys, vol. 54, no. 7, pp. 1–38, 2022.
3.K. Das, A. K. Mishra, and M. R. Panda, ”A survey on insider threat detection using machine learning,” IEEE Access, vol. 11, pp. 45230–45252, 2023.
4.T. Liu, K. M. Ting, and Z. H. Zhou, ”Isolation forest,” in Proc. IEEE International Conference on Data Mining (ICDM), 2008, pp. 413–422.
5.Carnegie Mellon University CERT Division, ”Insider threat test dataset (r6.2),” Software Engineering Institute, Technical Report, 2016.
6.K. Sood and D. K. Sharma, ”Hybrid machine learning framework for insider threat detection,” Journal of Information Security and Appli-cations, vol. 68, art. no. 103221, 2022.
7.M. Lundberg and S. I. Lee, ”A unified approach to interpreting model predictions,” in Advances in Neural Information Processing Systems (NeurIPS), 2017, pp. 4765–4774.
8.A. Maxion and T. N. Townsend, ”Masquerade detection using truncated command lines,” in Proc. IEEE International Conference on Dependable Systems and Networks (DSN), 2002, pp. 219–228.
9.Cappelli, A. Moore, and R. Trzeciak, The CERT Guide to Insider Threats, Addison-Wesley, 2012.
10.A. C. Santos, ”Insider threat detection using user behavior analysis,” Computers & Security, vol. 79, pp. 104–118, 2018.