Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

Insider threat detection: Strengthening enterprise IAM (Identity and access management) landscape

Breadcrumb

  • Home
  • Insider threat detection: Strengthening enterprise IAM (Identity and access management) landscape

Sundeep Reddy Mamidi *

Department of Computer Science, Southern New Hampshire University, USA.

Research Article
 
World Journal of Advanced Engineering Technology and Sciences, 2024, 13(02), 515-527.
Article DOI: 10.30574/wjaets.2024.13.2.0633
DOI url: https://doi.org/10.30574/wjaets.2024.13.2.0633

Received on 09 November 2024; revised on 15 December 2024; accepted on 18 December 2024

Insider threats are one of the biggest threats to the organization's security, given that they often avert detection by standard protection measures because of legitimate access. This research examines IAM systems' ability to alarm and prevent enterprise insider threats. The study's research objectives are as follows: The study will discuss the effectiveness of IAM frameworks and identify the gaps, and the study will equally investigate enhanced detection methods like behavioral analytics and third-generation methods like machine learning, real-time monitoring, and others. Key concepts for the methodology include a survey of the state of IAM, case studies focusing on insider threats, and emerging technology analysis. Such analysis shows that while more conventional IAM systems may be crucial to ensure user access management, these systems need to be revised to help uncover patterns of behavior that point to a malicious user. Notably, there needs to be more literature on the real-time monitoring of IAM systems and the integration of behavior analytics; therefore, the study advances recommendations for improving these systems. The research’s material results prove that there is a potential for various organisations to enhance IAM by implementing modern threat identification techniques for addressing new types of threats. This paper ends with recommendations on how IAM practice and research can improve the constantly updating internal threats.

Insider Threats; Zero Trust; Machine Learning; Blockchain Security; Data Integrity; Anomaly Detection

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2024-0633.pdf

Get Your e Certificate of Publication using below link

Download Certificate

Preview Article PDF

Sundeep Reddy Mamidi. Insider threat detection: Strengthening enterprise IAM (Identity and access management) landscape. World Journal of Advanced Engineering Technology and Sciences, 2024, 13(02), 515-527. Article DOI: https://doi.org/10.30574/wjaets.2024.13.2.0633

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution