Detecting insider threats in banking using AI-driven anomaly detection with a data science approach to cybersecurity
1 College of Engineering Technology, Grand Canyon University, Phoenix, Arizona, USA.
2 Department of Engineering and Computer Science, University of East London.
3 Interswitch Group, Lagos, Nigeria.
4 Joltz Security Nigeria Limited, Lagos, Nigeria.
5 IT Project Manager independent Research consultant, Toronto, Canada.
6 Department of Information Technology services, Washburn University, Topeka, KS USA.
Review Article
World Journal of Advanced Research and Reviews, 2024, 24(02), 123–132
Publication history:
Received on 27 September 2024; revised on 04 November 2024; accepted on 06 November 2024
Abstract:
The banking sector faces an increasingly critical challenge in detecting and preventing insider threats, which account for significant financial losses and data breaches annually. This comprehensive review explores how artificial intelligence-driven anomaly detection, integrated with advanced data science approaches and cybersecurity frameworks, is transforming insider threat detection in banking institutions. By synthesizing current research in behavioral analytics, machine learning methodologies, and employee activity monitoring, the study examines how AI-driven technologies are revolutionizing traditional approaches to insider threat detection and risk management. The review critically analyzes emerging AI-driven methodologies, particularly focusing on unsupervised learning techniques, behavioral pattern analysis, and real-time employee activity monitoring systems. Through an extensive examination of behavioral analytics frameworks, privileged access monitoring, and user entity behavior analytics (UEBA), the research illuminates both the potential and challenges of AI-powered insider threat detection. The investigation reveals significant advancements in behavioral anomaly detection, predictive modeling of employee activities and network behavior analysis while simultaneously addressing critical privacy considerations and regulatory complexities specific to employee monitoring.
Keywords:
Insider Threat Detection; Behavioral Analytics; Employee Monitoring; Anomaly Detection; User Entity Behavior Analytics (UEBA); Privileged Access Management
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0