LSTM autoencoder, an algorithm suitable for abnor-
mal behavior detection.
To prove the effectiveness of the proposed
method, de-identification evaluation and abnormal
behavior detection performance comparison were
conducted. In the de-identification evaluation, risk
analysis was conducted by applying three attacker
models, and it was proven that the de-identified
dataset had only a low possibility of re-identification
and was therefore safe. On the other hand, in the ab-
normal behavior detection performance comparison
experiment, the de-identified data resulted in slightly
improved performance and a higher detection rate
than those obtained using the identifiable data.
In follow-up research, we plan to conduct further
studies to expand the scope of application of anomaly
detection solutions using de-identified datasets by set-
ting various anomaly detection situations and provid-
ing anomaly detection solutions tailored to each situ-
ation.
ACKNOWLEDGEMENTS
This work was partly supported by the Korea Institute
for Advancement of Technology (KIAT) grant funded
by the Korean Government (MOTIE) (P0008703, The
Competency Development Program for Industry Spe-
cialists) and MSIT under the ICAN (ICT Challenge
and Advanced Network of HRD) program (No. IITP-
2022-RS-2022-00156310), supervised by the Insti-
tute of Information Communication Technology Plan-
ning and Evaluation (IITP).
REFERENCES
Abiodun, M. K., Adeniyi, A. E., Victor, A. O., Awotunde,
J. B., Atanda, O. G., and Adeniyi, J. K. (2023). De-
tection and prevention of data leakage in transit us-
ing lstm recurrent neural network with encryption al-
gorithm. In 2023 International Conference on Sci-
ence, Engineering and Business for Sustainable De-
velopment Goals (SEB-SDG), volume 1, pages 01–09.
IEEE.
Al-Mhiqani, M. N., Ahmad, R., Abidin, Z. Z., Abdulka-
reem, K. H., Mohammed, M. A., Gupta, D., and
Shankar, K. (2022). A new intelligent multilayer
framework for insider threat detection. Computers &
Electrical Engineering, 97:107597.
Ashraf, J., Bakhshi, A. D., Moustafa, N., Khurshid, H.,
Javed, A., and Beheshti, A. (2020). Novel deep
learning-enabled lstm autoencoder architecture for
discovering anomalous events from intelligent trans-
portation systems. IEEE Transactions on Intelligent
Transportation Systems, 22(7):4507–4518.
Chomutare, T. (2022). Clinical notes de-identification:
Scoping recent benchmarks for n2c2 datasets. Stud
Health Technol Inform, pages 293–6.
Cui, L., Qu, Y., Xie, G., Zeng, D., Li, R., Shen, S., and
Yu, S. (2021). Security and privacy-enhanced feder-
ated learning for anomaly detection in iot infrastruc-
tures. IEEE Transactions on Industrial Informatics,
18(5):3492–3500.
Goryunova, V., Goryunova, T., and Molodtsova, Y. (2020).
Integration and security of corporate information sys-
tems in the context of industrial digitalization. In
2020 2nd International Conference on Control Sys-
tems, Mathematical Modeling, Automation and En-
ergy Efficiency (SUMMA), pages 710–715. IEEE.
Gurucul (2023). Insider threat report: 2023 cybersecurity
survey. Technical report, Gurucul.
Institute, C. M. U. S. E. (2013). Cert insider threat
test dataset. https://resources.sei.cmu.edu/library/
asset-view.cfm?assetid=508099. Accessed: 2023-09-
14.
Ito, S. and Kikuchi, H. (2022). Estimation of cost of k–
anonymity in the number of dummy records. Journal
of Ambient Intelligence and Humanized Computing,
pages 1–10.
Jamshidi, M. A., Veisi, H., Mojahedian, M. M., and
Aref, M. R. (2024). Adjustable privacy using
autoencoder-based learning structure. Neurocomput-
ing, 566:127043.
Koll, C. E., Hopff, S. M., Meurers, T., Lee, C. H., Kohls,
M., Stellbrink, C., Thibeault, C., Reinke, L., Stein-
brecher, S., Schreiber, S., et al. (2022). Statistical bi-
ases due to anonymization evaluated in an open clin-
ical dataset from covid-19 patients. Scientific Data,
9(1):776.
Li, Z., Lee, G., Raghu, T., and Shi, Z. (2023). Does data pri-
vacy regulation only benefit contracting parties? evi-
dence from international digital product market.
Naim, A., Alqahtani, H., Muniasamy, A., Bilfaqih, S. M.,
Mahveen, R., and Mahjabeen, R. (2023). Applications
of information systems and data security in market-
ing management. In Fraud Prevention, Confidential-
ity, and Data Security for Modern Businesses, pages
57–83. IGI Global.
Nam, H.-S., Jeong, Y.-K., and Park, J. W. (2020). An
anomaly detection scheme based on lstm autoencoder
for energy management. In 2020 international confer-
ence on information and communication technology
convergence (ICTC), pages 1445–1447. IEEE.
Nguyen, H. D., Tran, K. P., Thomassey, S., and Hamad,
M. (2021). Forecasting and anomaly detection ap-
proaches using lstm and lstm autoencoder techniques
with the applications in supply chain management.
International Journal of Information Management,
57:102282.
Rai, B. K. (2022). Ephemeral pseudonym based
de-identification system to reduce impact of in-
ference attacks in healthcare information system.
Health Services and Outcomes Research Methodol-
ogy, 22(3):397–415.
LSTM Autoencoder-Based Insider Abnormal Behavior Detection Using De-Identified Data
619