Employee Risk Analysis

{% with messages = get_flashed_messages(with_categories=true) %} {% if messages %} {% for category, message in messages %} {% endfor %} {% endif %} {% endwith %} {% if not model_ready %} {% else %}

Enter Employee Data

Activity Patterns
{% for feature in feature_names %} {% if feature in ['logon_cnt', 'http_cnt', 'email_cnt', 'logon_after_hours_pct', 'logon_weekend_cnt', 'logon_hour_entropy', 'logon_dow_entropy'] %}
{% endif %} {% endfor %}
USB Activity
{% for feature in feature_names %} {% if feature in ['usb_cnt', 'usb_act_Connect', 'usb_act_Disconnect', 'usb_after_hours_pct', 'usb_weekend_cnt'] %}
{% endif %} {% endfor %}
Behavioral Ratios
{% for feature in feature_names %} {% if feature in ['email_to_http_ratio', 'usb_to_logon_ratio'] %}
{% endif %} {% endfor %}
Personality Traits (Big Five)
{% for feature in feature_names %} {% if feature in ['O', 'C', 'E', 'A', 'N'] %}
{% endif %} {% endfor %}
Psychological Risk
{% for feature in feature_names %} {% if feature == 'psych_risk' %}
{% endif %} {% endfor %}
Quick Fill Options:
{% if result %}

Risk Assessment Results

{% if result.prediction == 1 %} {% else %} {% endif %} {{ result.threat_status }}

Confidence: {{ result.confidence_percentage }}%
{{ result.confidence_percentage }}%
Assessment Details:
  • Prediction Value: {{ result.prediction }}
  • Risk Probability: {{ "%.4f"|format(result.probability) }}
  • Classification: {{ "Insider Threat Detected" if result.prediction == 1 else "Normal Behavior" }}
  • Analysis Date: {{ moment().format('YYYY-MM-DD HH:mm:ss') if moment else 'Current' }}
Key Risk Indicators:
{% if result.input_data %} {% if result.input_data.get('logon_after_hours_pct', 0) > 20 %} High After-Hours Activity {% endif %} {% if result.input_data.get('usb_after_hours_pct', 0) > 30 %} Unusual USB Usage {% endif %} {% if result.input_data.get('psych_risk', 0) > 0.5 %} Elevated Psychological Risk {% endif %} {% if result.input_data.get('email_to_http_ratio', 0) > 0.1 %} High Email Activity {% endif %} {% endif %}
Recommendations:
{% if result.prediction == 1 %}
  • Immediate: Increase monitoring of this employee
  • Security: Review and potentially restrict access permissions
  • Investigation: Conduct thorough security assessment
  • Training: Provide additional security awareness training
  • Documentation: Record findings for security team review
{% else %}
  • Status: Employee shows normal behavior patterns
  • Monitoring: Continue standard monitoring procedures
  • Action: No immediate action required
  • Schedule: Regular reassessment recommended (monthly/quarterly)
  • Maintenance: Keep employee data updated for accuracy
{% endif %}
{% else %}

Instructions

How to Use This System:
  1. Fill in Employee Data: Enter values for each behavioral feature in the form on the left.
  2. Activity Patterns: Include login counts, timing patterns, and system usage data.
  3. USB Activity: Enter USB device usage patterns and timing information.
  4. Behavioral Ratios: Include calculated ratios like email-to-HTTP and USB-to-login.
  5. Personality Traits: Enter Big Five personality scores (typically 1-5 scale).
  6. Psychological Risk: Include psychological risk assessment score.
  7. Analyze: Click the "Analyze Risk" button to get the threat assessment.
Tips for Accurate Analysis:
  • Precision: Use decimal values for precise measurements
  • Percentages: Enter values between 0 and 100 for percentage fields
  • Personality: Big Five traits are typically scored 1-5
  • Missing Data: Leave fields as 0 if data is not available
  • Sample Data: Use "Quick Fill" buttons to test with sample data
Important Notes:
  • This system is for risk assessment only, not final decisions
  • Results should be reviewed by security professionals
  • Regular model updates and retraining are recommended
  • Consider multiple factors beyond this analysis
{% endif %}
{% endif %}