Insider Threat Detection
Home
Analyze Employee
About
Employee Risk Analysis
{% with messages = get_flashed_messages(with_categories=true) %} {% if messages %} {% for category, message in messages %}
{{ message }}
{% endfor %} {% endif %} {% endwith %} {% if not model_ready %}
Model Not Ready:
The machine learning model is not properly loaded. Please check that all model files are present in the models/ directory.
{% else %}
Enter Employee Data
Activity Patterns
{% for feature in feature_names %} {% if feature in ['logon_cnt', 'http_cnt', 'email_cnt', 'logon_after_hours_pct', 'logon_weekend_cnt', 'logon_hour_entropy', 'logon_dow_entropy'] %}
{{ feature.replace('_', ' ').title() }}
{% endif %} {% endfor %}
USB Activity
{% for feature in feature_names %} {% if feature in ['usb_cnt', 'usb_act_Connect', 'usb_act_Disconnect', 'usb_after_hours_pct', 'usb_weekend_cnt'] %}
{{ feature.replace('_', ' ').title() }}
{% endif %} {% endfor %}
Behavioral Ratios
{% for feature in feature_names %} {% if feature in ['email_to_http_ratio', 'usb_to_logon_ratio'] %}
{{ feature.replace('_', ' ').title() }}
{% endif %} {% endfor %}
Personality Traits (Big Five)
{% for feature in feature_names %} {% if feature in ['O', 'C', 'E', 'A', 'N'] %}
{% if feature == 'O' %}Openness (O) {% elif feature == 'C' %}Conscientiousness (C) {% elif feature == 'E' %}Extraversion (E) {% elif feature == 'A' %}Agreeableness (A) {% elif feature == 'N' %}Neuroticism (N) {% endif %}
{% endif %} {% endfor %}
Psychological Risk
{% for feature in feature_names %} {% if feature == 'psych_risk' %}
Psychological Risk Score
{% endif %} {% endfor %}
Analyze Risk
Quick Fill Options:
Normal Employee
Suspicious Employee
Clear All
{% if result %}
Risk Assessment Results
{% if result.prediction == 1 %}
{% else %}
{% endif %} {{ result.threat_status }}
Confidence: {{ result.confidence_percentage }}%
{{ result.confidence_percentage }}%
{{ result.message }}
Assessment Details:
Prediction Value:
{{ result.prediction }}
Risk Probability:
{{ "%.4f"|format(result.probability) }}
Classification:
{{ "Insider Threat Detected" if result.prediction == 1 else "Normal Behavior" }}
Analysis Date:
{{ moment().format('YYYY-MM-DD HH:mm:ss') if moment else 'Current' }}
Key Risk Indicators:
{% if result.input_data %} {% if result.input_data.get('logon_after_hours_pct', 0) > 20 %}
High After-Hours Activity
{% endif %} {% if result.input_data.get('usb_after_hours_pct', 0) > 30 %}
Unusual USB Usage
{% endif %} {% if result.input_data.get('psych_risk', 0) > 0.5 %}
Elevated Psychological Risk
{% endif %} {% if result.input_data.get('email_to_http_ratio', 0) > 0.1 %}
High Email Activity
{% endif %} {% endif %}
Recommendations:
{% if result.prediction == 1 %}
Immediate:
Increase monitoring of this employee
Security:
Review and potentially restrict access permissions
Investigation:
Conduct thorough security assessment
Training:
Provide additional security awareness training
Documentation:
Record findings for security team review
{% else %}
Status:
Employee shows normal behavior patterns
Monitoring:
Continue standard monitoring procedures
Action:
No immediate action required
Schedule:
Regular reassessment recommended (monthly/quarterly)
Maintenance:
Keep employee data updated for accuracy
{% endif %}
Analyze Another Employee
Export Results
{% else %}
Instructions
How to Use This System:
Fill in Employee Data:
Enter values for each behavioral feature in the form on the left.
Activity Patterns:
Include login counts, timing patterns, and system usage data.
USB Activity:
Enter USB device usage patterns and timing information.
Behavioral Ratios:
Include calculated ratios like email-to-HTTP and USB-to-login.
Personality Traits:
Enter Big Five personality scores (typically 1-5 scale).
Psychological Risk:
Include psychological risk assessment score.
Analyze:
Click the "Analyze Risk" button to get the threat assessment.
Tips for Accurate Analysis:
Precision:
Use decimal values for precise measurements
Percentages:
Enter values between 0 and 100 for percentage fields
Personality:
Big Five traits are typically scored 1-5
Missing Data:
Leave fields as 0 if data is not available
Sample Data:
Use "Quick Fill" buttons to test with sample data
Important Notes:
This system is for risk assessment only, not final decisions
Results should be reviewed by security professionals
Regular model updates and retraining are recommended
Consider multiple factors beyond this analysis
{% endif %}
{% endif %}