Indonesian Journal of Electrical Engineering and Computer Science Vol. 17, No. 3, March 2020, pp. 1474~1479 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v17.i3.pp1474-1479 1474 Journal homepage: http://ijeecs.iaescore.com New insider threat detection method based on recurrent neural networks Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Zaheera Zainal Abidin, Warusia Yassin, Aslinda Hassan, Ameera Natasha Mohammad Information Security and Networking Research Group (InFORSNET), Center for Advanced Computing Technology, Faculty of Information Communication Technology, Universiti Teknikal Malaysia Melaka, Malaysia Article Info ABSTRACT Article history: Received Jul 8, 2019 Revised Sep 10, 2019 Accepted Sep 26, 2019 Insider threat is a significant challenge in cybersecurity. In comparison with outside attackers, inside attackers have more privileges and legitimate access to information and facilities that can cause considerable damage to an organization. Most organizations that implement traditional cybersecurity techniques, such as intrusion detection systems, fail to detect insider threats given the lack of extensive knowledge on insider behavior patterns. However, a sophisticated method is necessary for an in-depth understanding of insider activities that the insider performs in the organization. In this study, we propose a new conceptual method for insider threat detection on the basis of the behaviors of an insider. In addition, gated recurrent unit neural network will be explored further to enhance the insider threat detector. This method will identify the optimal behavioral pattern of insider actions. Keywords: Cyber security Deep learning Gated recurrent network Insider Insider threat Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mohammed Nasser Al-Mhiqani, Information Security and Networking, Research Group (InFORSNET), Universiti Teknikal Malaysia Melaka, Melaka, Malaysia. Email: almohaiqny@gmail.com 1. INTRODUCTION Insider threat have been a critical threat source for an organization given their increased access and opportunity that can cause considerable damage to the organization. In comparison with outsiders, insiders have more privileged and legitimate access to information and facilities. Moreover, insiders are knowledgeable about an organization and its critical assets. With the additional knowledge of insiders, conducting an attack is easy for these insiders because they can hide their hacking trail/activities [1-3]. Surprisingly, 2018 insider threat reports have shown that 53% of threats come from within an organization in the last 12 months [4]. Moreover, 27% of surveyed organizations have stated that attacks originate from inside [4]. Thus, most organizations that implement cybersecurity techniques, such as intrusion detection, firewall, and electronic access system, aim to protect data not only from outside threats but also from insider threats [5]. In the last decades, many incidents of insider threats have gradually reached the media; for example, well-known cases of data leakage have been conducted by Edward Snowden, Daniel Ellsberg, and Chelsea Manning [6]. In contrast to the threats by outsiders, insider threats are easy to perform with no experience or advanced technical knowledge required given the authorization access that insiders have and the knowledge of the vulnerabilities of business processes and deployed systems. In comparison with outsiders whose hacking trails are hard to hide, malicious insiders are difficult to detect [6, 7]. Recurrent neural network (RNN) considers current value and previous input, thereby making this algorithm different from other neural networks. Therefore, RNN has been extensively used for solving the